This serves the interests of Ethiopias leadership on a number of fronts, including delivering its long-term economic vision of Ethiopia, maintaining the loyalty of the leadership of a key security organization and generating rents that can be used for a variety of purposes. Led by Bomba and based on successful Asian farming models, the federal government is beginning to use satellite soil mapping technology, video footage and drones in order to support farmers and increase sales. Many interviewees pointed to the sustained trajectory of professionalization that the Ethiopian military has gone through, focusing on human resources, education and operational capability. The party continues to enjoy an undisputed hold over national political power and has used its position in part to advance state-led development efforts. . Ethiopia is moving forward with allowing multiple telecom operators. On April 13, 2022, Ethio Telecom and Safaricom expressed that they had successfully concluded negotiation with the regulator, ECA, on a 10-year infrastructure sharing and interconnections agreement. Taught by the ethical hackers that went through hundreds of pentests. [65] At the highest levels, overlap between some senior security chiefs and membership of the TPLFs central or executive committees indicates,[66] for example, party political control as well as the potential existence of hybrid lines of command. This is to ensure that we retain our excellence in helping businesses defend against the latest cyber threats. Instead, the profits and rents it generates appear to have been managed with a view to longer-term development. The GOE has developed infrastructure for an IT Park to attract ICT service companies, particularly those involved in outsourcing. Tailored training could be provided regarding any specific needs and specialized subjects. emerging technology? However, federal forces, as well as the armed forces, were said to intervene in situations that are legally beyond their remit or jurisdiction. In short, given the countrys other developmental challenges, funds are scarce and while the military is essential, it is not typically a productive asset. The Ethiopian Federal Police force was created in 1995 to maintain law and order at the federal level (including riot control) and to investigate organized crime. While technology is uplifting Ethiopia in many ways through farming, transportation and education, there are still opportunities for the Ethiopian government as well as international governments and organizations to create positive change and aspire future innovation within Ethiopia. Thank you so much. ENA November 6/2019 Ethiopia needs to develop a well organized legal framework to tackle the ever-increasing cyber attacks at the national level, Cyber Expert said. USA.gov|FOIA|Privacy Program|EEO Policy|Disclaimer|Information Quality Guidelines |Accessibility, Official Website of the International Trade Administration, Information and Communication Technology (ICT), Ethiopia - Information and Communication Technology (ICT), Comply with U.S. and Foreign Export Regulations. The security situation across northern Ethiopia will remain volatile through at least early March after officials lifted a state of emergency (SoE) as of Feb. 15. . 1 Level 1: Introductory; Course description; Nutrition . Finally, the interviews identified two imminent challenges to the TPLF/EPRDFs ability to continue organizing security on the basis of the principle of party control. organizations and groups? Applying a strategic way of thinking in order to identify breaches in your system at all levels. Ethio Telecom has finalized the infrastructure build-out under its Expansion Telephone Plan I (ETP I), with Chinas ZTE and Huawei Corporation and the Swedish firm Ericsson all taking part. If you need urgent help, call +251 (0)11 617 0100. Keywords: Vulnerability Analysis; Security Testing, Vulnerability Assessment; Penetration Testing, Web Application Penetration Testing. discuss in briefly? From a resource viewpoint, a number of interviewees suggested that the federal police force is much better resourced than the regional police forces and that the latters (cap)ability is more variable. Currently, it refers to an effort to promote better management and more dialogue at all levels of the public sector by engaging households directly in development issues. This report presents some highlights of the application of information technology (IT) in Ethiopia and attempts to show the overall situation.However, it may be worth noting that, on the basis of the present activities and the 10-year perspective plan, it is very likely that the situation will change dramatically in the next two to five years. Following passage by Ethiopias parliament of a new communication service proclamation, a new regulatory agency, Ethiopian Communication Authority (ECA), was established in 2019 with a mandate to license and regulate communication operators in the country. Even though the subject matter is We identify the threats coming from inside or detect what a hacker that already penetrated the system has stolen. In addition, lack of awareness and lack of expertise in cybersecurity also contributed to the increasing level of cyber attacks in the country. The level of political control discussed earlier, in combination with the noted fusion of political and economic interests, also makes it strategically sensible to give the military a stake in the Ethiopian economy. Series note: In this assignment, you are required to write a proper and compiled report what you are answered and a plagiarized document will be rejected Feel free to contact me for any questions regards to this assignment via email address: bayihtizazu@gmail or betselotyy2007@gmail [64] According to a substantial number of interviewees (including some policy-makers and security officials), one consequence is that it has become difficult to distinguish the government from the party, and the security services are easily perceived as partisan executive agencies. The information included here is based on interviews conducted for this report. This type of security is necessary to prevent a hacker from accessing data inside the network. . This situation of selective impunity is compounded by the state of Ethiopias state judiciary which, although less plagued by favouritism and petty corruption than that of many other African countries, has a number of problems that it needs to address in order to ensure fair recourse to justice, such as a lack of pre-trial access to a lawyer, non-recognition of the principle of the presumption of innocence, and executive influence (in politically charged cases in particular). Preparation for a range of international certification exams; CISSP of (ISC)2 and ISACAs CISM, CRISC, CISA. TheInternational Trade Administration,U.S. Department of Commerce, manages this global trade site to provide access to ITA information on promoting trade and investment, strengthening the competitiveness of U.S. industry, and ensuring fair trade and compliance with trade laws and agreements. The main vehicle through which military involvement in the economy takes shape is the Ethiopian Metals & Engineering Corporation (METEC), a parastatal business conglomerate run by the military. What is Artificial intelligence? Energy Policy. Thus, while the most secure systems may be those that are built from (ed. The report comes via email as a PDF file and has over 180pages covering this information: Technologies Breakdown and Segmentation ReportsWhich technologies are particularly popular among .et sites? Ethiopia is a major producer of cereals and the largest wheat producer in sub-Saharan Africa. benefits and drawbacks of artificial intelligence? With the aid of developed countries abroad, Ethiopia hopes to accelerate its development as a nation with the implementation of technology in education. Data from 2015 shows that the country recorded more than 10,000 traffic-related accidents and 418 traffic-related deaths in Addis Ababa alone. On the flip . A number of interviewees indicated that there is little space and ability for critical thinking at local levels of government. Our web technology usage report is a detailed monthly report on the usage of web technologies within the .et top level domain (Ethiopia). Second, it sought to relate defence capability requirements to the national economy.[85]. While their numbers, structure and even uniforms may vary, they each report to a Regional Police Commission that works loosely together with the Federal Police Commission. The current contribution of the communication sector to GDP is approximately 2%, compared with the 4% average in the East Africa region. APDF readeris available from Adobe Systems Incorporated. Countries even which have well organized . It contends that the central purpose of Ethiopia's foreign and security policy has remained the same, in spite of the shift in orientation as well as clichs and shibboleths. In Ethiopias capital, the Addis Ababa Lightrail has proved itself to be a huge technological gain for the country. However, Oromia Regional State and in particular the city of Addis Ababa have seen uncoordinated police interventions. Employment Policy. Feel free to contact me for any questions regards to this assignment via email address: It has a reputation for quality and effectiveness despite its limited means. A U.S. based organization, ET Learns, has been the leading champion in stimulating growth in educational technology in Ethiopia. The GOE plans to expand the information and communication technology (ICT) manufacturing industry, modernize infrastructure, and increase private sector participation. Prior to this massive rail endeavor, Mulugeta Gudeta, a figure of Addis Ababas Chamber of Commerce said, the state of public transportation in Addis Ababa is perhaps the weakest link in the otherwise fast-growing economy in the Ethiopian capitalworkers often find it difficult to reach their workplaces in time. It is also clear that further research is needed to establish the opportunities and risks presented by the role of the Ethiopian military in the countrys economy. [70] The 2005 elections remain a landmark in this regard and continue to influence international and opposition interpretative frames. Its competence and its international standing make it a positive exception to the lack of technocratic integrity that has been observed in respect of other aspects of the Ethiopian administration, i.e. The federal police force comes under the Federal Police Commission that reports to the Ministry of Federal Affairs (until recently the Ministry of Justice). more emphasis what you cover and asses on your home stay time. Customers can also use telebirr to buy airtime and packages, pay with telebirr for utilities and traffic penalties; buy airtime and pay for merchants. [72] A number of interviews also suggested that members of the state security organizations are rarely prosecuted for committing such violations when these can be interpreted as acting against political unrest or threat. For information on returning to England from Ethiopia . Among 15 . Washington, DC 20230. Such suspicion is understandable, given Ethiopias history of centralized rule supported by powerful law enforcement agencies, selective law enforcement and poor treatment of suspects. A real Ethical Hacking approach where we act just as hackers would. The interviews suggested that, on balance, this results in a patchwork of security provision in terms of its quantity and quality that radiates out from Ethiopias core, serves to preserve the present political order, limits de facto regional security autonomy and is lacking in mechanisms for enabling citizens security concerns to be reflected in state security policy and operations. Ethiopia's food security strategy highlights the government's plans to address the causes and effects of food insecurity in Ethiopia. See, Ethiopian National Intelligence and Security Service, Diagnosing Corruption in Ethiopia: Perceptions, Realities, and the Way Forward for Key Sectors, Ethiopia: Policing Ethiopia the Force vs. Service Dilemma, On Politics: A History of Political Thought from Herodotus to the Present, Political Violence and Democratic Uncertainty in Ethiopia, Double-Edged Swords: Armies, Elite Bargaining and State-Building, Kicking Away the Ladder: Development Strategy in Historical Perspective, Made in Africa: Industrial Policy in Ethiopia, The shadow world: Inside the global arms trade, Ethiopias National Security and Foreign Affairs Policy and Strategy. Some security policies have been perceived to be rolled out across the country, when further reflection, consultation or adjustment to local realities would have been useful. Nile water dispute stems from filling of Ethiopian dam, decades of rising tensions So far, despite international negotiations, there's been little progress in the decadelong dispute. How did you see Ethiopian technology usage and security levels? Strong government commitment to reach full access before 2030 in the STEPS. (2) What are the significant contributions made by prior researchers? JavaScript Content Delivery Networks. ECS Ethiopia provides Ethiopias leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business. Ethiopia's reform effort is unquestionably commendable as the country abandoned an obsolete law govering security rights, unfit for modern secured financing needs and schemes. At the same time, however, many interviewees also pointed to the gap that exists between the legal and policy frameworks that regulate the organization and delivery of security across the country, and reality. [67] However, interviewees widely acknowledged TPLF dominance of the top ranks. Regional police have primacy and federal police or military forces intervene only at the invitation of the regional government. While this risk is not limited to METEC, and private sector development so far represents only a limited feature of Ethiopias economic growth model, future diversification plans for METEC should be considered in this light as well.[92]. The National Information and Communication Technology Policy and Strategy (Amharic) Tax Audit Policy. While some writers have argued that co-opting local leaders and groups, ensuring a degree of executive influence on the judiciary and using the party apparatus at different administrative levels to influence loyalty and behaviour are the more commonly used tools for ensuring political compliance,[69] a significant number of interviewees saw Ethiopias security institutions as guardians of TPLF/EPRDF political dominance. Network security Network security is used to prevent unauthorized or malicious users from getting inside your network. Even though the subject matter is concerned both practical and theoretical sessions due to global occasions we are try to request home assignment on subject of Introduction to Emerging technology. Information is given on the diffusion of computers in various sectors of the economy, the number of installations, and the types and brands of computers in common use. Our information security training will immerse you into the deep-end of hands on, real world pentesting. The team is very professional, even going the extra mile caring for customer needs and all the details of the collaboration. Which are the fastest growing top level domains? Following a competitive bid process, ECA granted a nationwide full-service Unified Telecommunications Service License to the Safaricom Telecommunications Ethiopia PLC effective from 9 July 2021, valid for a term of fifteen (15) years from the effective date, and renewable for additional terms of fifteen (15) years subject to fulfillment of all license obligations. . Discover in which parts of the market your competition thrives. The ways in which technology is uplifting Ethiopia has resulted in many positive changes for the country as it seeks to alleviate a lack of resources, low economic capital and high poverty rates. Cyber Threat Defense performs penetration testing and code review on all platforms for mobile applications and has created a dedicated testing environment fully equipped for testing Android and iOS applications. "There is high potential for techies to . The government is planning to build a $250 million technology park, Ethio ICT, although critics worry it's another of Africa's pipe-dream tech cities. Second, the post-1991 emphasis on Ethiopias ethnic diversity is at odds with any over-representation of particular groups in any part of the federal administration (perceived or real) but especially in the countrys security forces. U.S. citizens full name and date ofbirth; The U.S. citizens U.S. passport number, if known; The U.S. citizens last known location and contact information, Launch of Pay.gov DS-82 Program: Two Ways to Pay for and Renew an Adult U.S. Passport, Security Alert U.S. Embassy Addis Ababa, Ethiopia, February 10, 2023. Indeed, Ethiopia is a federal country of 10 regional states each hosting at least one distinct ethnic group with a different language and/or religion. For a fascinating glimpse into the effort to renew the EPRDFs leadership through a staged succession plan (Metekatat) by Prime Minister Meles Zenawi: For a deeper analysis of the totalitarian aspects of Marxism and Leninism: Ryan, A.. Also on this point: Vaughan and Tronvoll (2002). The Government of Ethiopia (GOE) has embarked on a ten-year economic development plan (2021-2030) where agriculture is on the top of priority sectors. What is Data, information, knowledge and data Science? Such overlap reinforces existing perceptions of the utilization of security forces for partisan political purposes, or even of the securitization of political decisions. At the kebele level, we train public extension officers to screen those videos among . How well do you know your market? Ethio telecom, a publicly owned telecom and internet services providing company, launched the first ever mobile money transfer platform called telebirr. The state police forces legal basis is article 52 subsection 2 of the Constitution. With an estimated population of 110 million, and an average age of 18, Africa's second most populous country, Ethiopia has been the continent's sleeping giant on the tech scene. * Exchange rate for 2019 and 2020 are taken from NBE Mid-Market Rates. Service Focus. Addressing human rights violations in regional states also requires greater attention to the professional development of the forces that operate there.[79]. In an increasingly digitized world, technology is a necessary investment for developing countries and the ways in which we see this manifested in Ethiopia demonstrates this. In this unavoidably fragmented mix that results from the friction between the centralization of power and regional autonomy, a key flaw is the failure to consult with the Ethiopian people on what they see as their security priorities. Ethiopia's main state security organizations For the purpose of this paper, 'state security organizations' include the military, police (federal and state), and the intelligence services. usage and security levels. Since Ethiopia aspires to have an 'Industry Led Economy', identifying and assessing the level of technology utilization and developing strategies to improve the manufacturing competitiveness. Serbus Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools. Given the lack of publicly avalable data on forces composition in terms of ethnicity at various levels of seniority, it is difficult to produce more reliable findings. Finally, it has been accused of past human rights violations during operations in Somalia and Ogaden. The Visa Waiver Program (VWP) allows citizens of participating countries* to travel to the United States without a visa for stays of 90 days or less, when they meet all requirements. roles in our day to day lives of people and organizations, Discuss the components, This shows, for example, usage and market share and rank for each Content Management System among .et sites compared to the popularity on all websites. Type above and press Enter to search. A number of interviewees furthermore opined that these interventions tended to happen when regional forces were unable to deal with certain issues owing to a lack of operational clarity in their mandates, insufficient resources or when (conflicting) political interests of sufficient import were at stake. How did the popularity of the top level domains change over time? "This report is awesome. This digital strategy will establish a policy framework to support ecommerce in the country. The country's partial lockdown and . First, it stipulated a focus on human resources rather than material resources in the development of the armed forces. Only 11.6% of government institutions in Ethiopia have legal frameworks which are being at their trial level, while a majority, or 87.4% of them have no recognized legal frameworks to prevent cyber attacks. A real Ethical Hacking approach where we act just as hackers would. W3Techs did it in a new interesting way and we're looking forward to work with these tools. With the burden of a rising population and impoverished communities, Ethiopia is actively investing in technology ventures for farming and agriculture and seeing positive results. At the heart of the analysis of the organization of security in Ethiopia lies the fact that both peaceful and more forceful challenges to the rule of the TPLF/EPRDF have been either disabled or suppressed. ", "Your WordPress market report provided valuable insights into our potential customer base, which we will put into use for our product development.". ", "Thanks to the awesome guys at W3Techs we've now got a much better picture of how and why people are using cdnjs. [76] The former points to centralized direction-setting and party-political control whereas the latter points to local autonomy and the federal government serving in a function of last resort. ", "Your WordPress report gave us invaluable insights into the WordPress market which, I am confident to say, we wouldn't have got from anywhere else. Ethiopia is a low-income country and cannot afford the cost of data breaches. Interested local and international investors submitted an expressions of interest (EOI), the first of a series of stages that will lead to picking of a successful bidder. National Security Policy and Strategy. The Ethiopian Technology Authority (ETA) is a government organization established by Proclamation No. This is mostly because the national interest continues to be defined and decided on the basis of a particular ideology and set of individual/group interests that brooks no competition and allows little public debate. Cyber Threat Defense has been a valuable partner in securing our software. Tailored training could be provided regarding any specific needs and all the of... Information, knowledge and data Science educational technology in education modernize infrastructure, increase... Suite of secure communication, enterprise mobility and mobile device security tools the information communication... Penetration Testing, Web Application Penetration Testing, Vulnerability Assessment ; Penetration Testing Vulnerability... Have primacy and federal police or military forces intervene only ethiopian technology usage and security level the invitation of the armed.! Data from 2015 shows that the country & # x27 ; s lockdown. A low-income country and can not afford the cost of data breaches the securitization of political decisions which... Have primacy and federal police or military forces intervene only at the kebele level, we public. See Ethiopian technology Authority ( ETA ) is a low-income country and can afford... It Park to attract ICT service companies, particularly those involved in outsourcing of technology in.! Inside the network development of the top ranks did it in a new interesting way we! 1: Introductory ; Course description ; Nutrition have primacy and federal police or military intervene. Our information security training will immerse you into the deep-end of hands on, real world pentesting knowledge data. 1 level 1: Introductory ; Course description ; Nutrition fully managed suite of communication! Undisputed hold over national political power and has used its position in to. Over time expand the information and communication technology ( ICT ) manufacturing industry, modernize,. Of technology in education and mobile device security tools international certification exams ; CISSP of ( ). ) manufacturing industry, modernize infrastructure, and increase private sector participation communication, enterprise mobility mobile... Of thinking in order to identify breaches in your system at all levels the top ranks ISACAs CISM,,. Of ( ISC ) 2 and ISACAs CISM, CRISC, CISA market competition... Its position in part to advance state-led development efforts GOE has developed infrastructure for it. 2030 in the STEPS are the significant contributions made by prior researchers ; there is high potential for to... Technological gain for the country recorded more than 10,000 traffic-related accidents and 418 traffic-related deaths Addis! Defence capability requirements to the increasing level of cyber attacks in the country & # x27 ; s partial and. Strategy ( Amharic ) Tax Audit Policy power and has used its position in part to advance development. Act just as hackers would particularly those involved in outsourcing technology usage and security levels asses on your home time! ] the 2005 elections remain a landmark in this regard and continue influence... Interviewees indicated that there is little space and ability for critical thinking at levels. 11 617 0100 federal police or military forces intervene only at the kebele level we! To support ecommerce in the STEPS technology in education ; CISSP of ( )..., Oromia regional State and in particular the city of Addis Ababa have seen uncoordinated police interventions expand information... Huge technological ethiopian technology usage and security level for the country level, we train public extension officers to screen those among! Wheat producer in sub-Saharan Africa local levels of government the cost of data breaches 11 617 0100 Proclamation. Reinforces existing perceptions of the Constitution regarding any specific needs and specialized subjects economy. [ ]. Private sector participation Proclamation No access before 2030 in the development of the securitization of political decisions strategic of! Is high potential for techies to real world pentesting partial lockdown and this digital Strategy will establish a framework. Tax Audit Policy that are built from ( ed, CRISC, CISA forward with allowing telecom... Technology Authority ( ETA ) is a fully managed suite of secure communication, enterprise mobility mobile! Application Penetration Testing, Web Application Penetration Testing, Vulnerability Assessment ; Penetration Testing, Vulnerability Assessment Penetration... Competition thrives party continues to enjoy an undisputed hold over national political power has... Inside the network immerse you into the deep-end of hands on, real world pentesting communication. Helping businesses defend against the latest cyber threats strategic way of thinking in order to identify in., Oromia regional State and in particular the city of Addis Ababa alone hopes accelerate... And communication technology Policy and Strategy ( Amharic ) Tax Audit Policy in securing our software rents it appear. Continue to influence international and opposition interpretative frames 2015 shows that the country & # x27 ; partial. Interviewees indicated that there is high potential for techies to is article 52 subsection 2 of the top ranks 10,000... With a view to longer-term development keywords: Vulnerability Analysis ; security Testing Vulnerability! Reach full access before 2030 in the STEPS 1: Introductory ; Course description ; Nutrition resources in the of! 2020 are taken from NBE Mid-Market Rates and 2020 are taken from NBE Mid-Market.! Enjoy an undisputed hold over national political power and has used its position in part advance. What are the significant contributions made by prior researchers 2005 elections remain a landmark in regard! Analysis ; security Testing, Web Application Penetration Testing Park to attract ICT service companies particularly! Rents it generates appear to have been managed with a view to longer-term.! The utilization of security is used to prevent unauthorized or malicious users from inside. And continue to influence international and opposition interpretative frames and increase private sector participation of technology in ethiopia view! This is to ensure that we retain our excellence in helping businesses defend against latest. To screen those videos among telecom, a publicly owned telecom and internet services providing company, the. Analysis ; security Testing, Web Application Penetration Testing, Web Application Testing! Interviewees indicated that there is high potential for techies to itself to be a huge technological for! A government organization established by Proclamation No and in particular the city Addis. This is to ensure that we retain ethiopian technology usage and security level excellence in helping businesses defend against the latest cyber threats certification ;. In your system at all levels used its position in part to state-led. Organization established by Proclamation No going the extra mile caring for customer needs and all the details the... To prevent a hacker from accessing data inside the network hacker from accessing data inside the network that country. Than material resources in the country the top level domains change over time ; s partial lockdown.... Owned telecom and internet services providing company, launched the first ever money... Full access before 2030 in the STEPS it Park to attract ICT service companies, particularly those involved in.! Ecommerce in the STEPS customer needs and all the details of the securitization of political decisions the aid developed... Specialized subjects, and increase private sector participation forces for partisan political purposes, even! Your home stay ethiopian technology usage and security level exams ; CISSP of ( ISC ) 2 and ISACAs CISM, CRISC,.. With allowing multiple telecom operators itself to be a huge technological gain for the country thinking at local of. Data Science in cybersecurity also contributed to the increasing level of cyber attacks in the development of the securitization political. Are the significant contributions made by prior researchers is little space and ability for critical thinking at levels! Ict ) manufacturing industry, modernize infrastructure, and increase private sector.. Serbus serbus secure is a low-income country and can not afford the cost of data breaches champion in stimulating in... Managed suite of secure communication, ethiopian technology usage and security level mobility and mobile device security.... To prevent unauthorized or malicious users from getting inside your network support ecommerce in the country recorded than! Secure systems may be those that are built from ( ed expand the and. Internet services providing company, launched the first ever mobile money transfer platform called.... Preparation for a range of international certification exams ; CISSP of ( ISC ) 2 ISACAs., call +251 ( 0 ) 11 617 0100 the Constitution ; there is high potential for techies to international... Information and communication technology ( ICT ) manufacturing industry, modernize infrastructure, and increase private sector.... Policy framework to support ecommerce in the development of the regional government is 52... World pentesting a low-income country and can not afford the cost of breaches. Forces intervene only at the kebele level, we train public extension to! Mile caring for customer needs and specialized subjects finally, it has been the leading in... Ethio telecom, a publicly owned telecom and internet services providing company, launched the ever. Awareness and lack of expertise in cybersecurity also contributed to the increasing level of attacks... Of interviewees indicated that there is little space and ability for critical thinking at local of! Rate for 2019 and 2020 are taken from NBE Mid-Market Rates itself ethiopian technology usage and security level be a huge technological gain the. Police or military forces intervene only at the kebele level, we train public extension officers screen... Defense has been the leading champion in stimulating growth in educational technology in education forces legal basis article. Range of international certification exams ; CISSP of ( ISC ) 2 and CISM. The profits and rents it generates appear to have been managed with a view to longer-term development just. Introductory ; Course description ; Nutrition stimulating growth in educational technology in ethiopia and... Looking forward to work with these tools and continue to influence international and opposition frames! On, real world pentesting sector participation communication technology ( ICT ) manufacturing,. Market your competition thrives specialized subjects opposition interpretative frames ) is a major producer of cereals the. Police have primacy and federal police or military forces intervene only at kebele. While the most secure systems may be those that are built from ( ed, lack awareness!