This serves the interests of Ethiopias leadership on a number of fronts, including delivering its long-term economic vision of Ethiopia, maintaining the loyalty of the leadership of a key security organization and generating rents that can be used for a variety of purposes. Led by Bomba and based on successful Asian farming models, the federal government is beginning to use satellite soil mapping technology, video footage and drones in order to support farmers and increase sales. Many interviewees pointed to the sustained trajectory of professionalization that the Ethiopian military has gone through, focusing on human resources, education and operational capability. The party continues to enjoy an undisputed hold over national political power and has used its position in part to advance state-led development efforts. . Ethiopia is moving forward with allowing multiple telecom operators. On April 13, 2022, Ethio Telecom and Safaricom expressed that they had successfully concluded negotiation with the regulator, ECA, on a 10-year infrastructure sharing and interconnections agreement. Taught by the ethical hackers that went through hundreds of pentests. [65] At the highest levels, overlap between some senior security chiefs and membership of the TPLFs central or executive committees indicates,[66] for example, party political control as well as the potential existence of hybrid lines of command. This is to ensure that we retain our excellence in helping businesses defend against the latest cyber threats. Instead, the profits and rents it generates appear to have been managed with a view to longer-term development. The GOE has developed infrastructure for an IT Park to attract ICT service companies, particularly those involved in outsourcing. Tailored training could be provided regarding any specific needs and specialized subjects. emerging technology? However, federal forces, as well as the armed forces, were said to intervene in situations that are legally beyond their remit or jurisdiction. In short, given the countrys other developmental challenges, funds are scarce and while the military is essential, it is not typically a productive asset. The Ethiopian Federal Police force was created in 1995 to maintain law and order at the federal level (including riot control) and to investigate organized crime. While technology is uplifting Ethiopia in many ways through farming, transportation and education, there are still opportunities for the Ethiopian government as well as international governments and organizations to create positive change and aspire future innovation within Ethiopia. Thank you so much. ENA November 6/2019 Ethiopia needs to develop a well organized legal framework to tackle the ever-increasing cyber attacks at the national level, Cyber Expert said. USA.gov|FOIA|Privacy Program|EEO Policy|Disclaimer|Information Quality Guidelines |Accessibility, Official Website of the International Trade Administration, Information and Communication Technology (ICT), Ethiopia - Information and Communication Technology (ICT), Comply with U.S. and Foreign Export Regulations. The security situation across northern Ethiopia will remain volatile through at least early March after officials lifted a state of emergency (SoE) as of Feb. 15. . 1 Level 1: Introductory; Course description; Nutrition . Finally, the interviews identified two imminent challenges to the TPLF/EPRDFs ability to continue organizing security on the basis of the principle of party control. organizations and groups? Applying a strategic way of thinking in order to identify breaches in your system at all levels. Ethio Telecom has finalized the infrastructure build-out under its Expansion Telephone Plan I (ETP I), with Chinas ZTE and Huawei Corporation and the Swedish firm Ericsson all taking part. If you need urgent help, call +251 (0)11 617 0100. Keywords: Vulnerability Analysis; Security Testing, Vulnerability Assessment; Penetration Testing, Web Application Penetration Testing. discuss in briefly? From a resource viewpoint, a number of interviewees suggested that the federal police force is much better resourced than the regional police forces and that the latters (cap)ability is more variable. Currently, it refers to an effort to promote better management and more dialogue at all levels of the public sector by engaging households directly in development issues. This report presents some highlights of the application of information technology (IT) in Ethiopia and attempts to show the overall situation.However, it may be worth noting that, on the basis of the present activities and the 10-year perspective plan, it is very likely that the situation will change dramatically in the next two to five years. Following passage by Ethiopias parliament of a new communication service proclamation, a new regulatory agency, Ethiopian Communication Authority (ECA), was established in 2019 with a mandate to license and regulate communication operators in the country. Even though the subject matter is We identify the threats coming from inside or detect what a hacker that already penetrated the system has stolen. In addition, lack of awareness and lack of expertise in cybersecurity also contributed to the increasing level of cyber attacks in the country. The level of political control discussed earlier, in combination with the noted fusion of political and economic interests, also makes it strategically sensible to give the military a stake in the Ethiopian economy. Series note: In this assignment, you are required to write a proper and compiled report what you are answered and a plagiarized document will be rejected Feel free to contact me for any questions regards to this assignment via email address: bayihtizazu@gmail or betselotyy2007@gmail [64] According to a substantial number of interviewees (including some policy-makers and security officials), one consequence is that it has become difficult to distinguish the government from the party, and the security services are easily perceived as partisan executive agencies. The information included here is based on interviews conducted for this report. This type of security is necessary to prevent a hacker from accessing data inside the network. . This situation of selective impunity is compounded by the state of Ethiopias state judiciary which, although less plagued by favouritism and petty corruption than that of many other African countries, has a number of problems that it needs to address in order to ensure fair recourse to justice, such as a lack of pre-trial access to a lawyer, non-recognition of the principle of the presumption of innocence, and executive influence (in politically charged cases in particular). Preparation for a range of international certification exams; CISSP of (ISC)2 and ISACAs CISM, CRISC, CISA. TheInternational Trade Administration,U.S. Department of Commerce, manages this global trade site to provide access to ITA information on promoting trade and investment, strengthening the competitiveness of U.S. industry, and ensuring fair trade and compliance with trade laws and agreements. The main vehicle through which military involvement in the economy takes shape is the Ethiopian Metals & Engineering Corporation (METEC), a parastatal business conglomerate run by the military. What is Artificial intelligence? Energy Policy. Thus, while the most secure systems may be those that are built from (ed. The report comes via email as a PDF file and has over 180pages covering this information: Technologies Breakdown and Segmentation ReportsWhich technologies are particularly popular among .et sites? Ethiopia is a major producer of cereals and the largest wheat producer in sub-Saharan Africa. benefits and drawbacks of artificial intelligence? With the aid of developed countries abroad, Ethiopia hopes to accelerate its development as a nation with the implementation of technology in education. Data from 2015 shows that the country recorded more than 10,000 traffic-related accidents and 418 traffic-related deaths in Addis Ababa alone. On the flip . A number of interviewees indicated that there is little space and ability for critical thinking at local levels of government. Our web technology usage report is a detailed monthly report on the usage of web technologies within the .et top level domain (Ethiopia). Second, it sought to relate defence capability requirements to the national economy.[85]. While their numbers, structure and even uniforms may vary, they each report to a Regional Police Commission that works loosely together with the Federal Police Commission. The current contribution of the communication sector to GDP is approximately 2%, compared with the 4% average in the East Africa region. APDF readeris available from Adobe Systems Incorporated. Countries even which have well organized . It contends that the central purpose of Ethiopia's foreign and security policy has remained the same, in spite of the shift in orientation as well as clichs and shibboleths. In Ethiopias capital, the Addis Ababa Lightrail has proved itself to be a huge technological gain for the country. However, Oromia Regional State and in particular the city of Addis Ababa have seen uncoordinated police interventions. Employment Policy. Feel free to contact me for any questions regards to this assignment via email address: It has a reputation for quality and effectiveness despite its limited means. A U.S. based organization, ET Learns, has been the leading champion in stimulating growth in educational technology in Ethiopia. The GOE plans to expand the information and communication technology (ICT) manufacturing industry, modernize infrastructure, and increase private sector participation. Prior to this massive rail endeavor, Mulugeta Gudeta, a figure of Addis Ababas Chamber of Commerce said, the state of public transportation in Addis Ababa is perhaps the weakest link in the otherwise fast-growing economy in the Ethiopian capitalworkers often find it difficult to reach their workplaces in time. It is also clear that further research is needed to establish the opportunities and risks presented by the role of the Ethiopian military in the countrys economy. [70] The 2005 elections remain a landmark in this regard and continue to influence international and opposition interpretative frames. Its competence and its international standing make it a positive exception to the lack of technocratic integrity that has been observed in respect of other aspects of the Ethiopian administration, i.e. The federal police force comes under the Federal Police Commission that reports to the Ministry of Federal Affairs (until recently the Ministry of Justice). more emphasis what you cover and asses on your home stay time. Customers can also use telebirr to buy airtime and packages, pay with telebirr for utilities and traffic penalties; buy airtime and pay for merchants. [72] A number of interviews also suggested that members of the state security organizations are rarely prosecuted for committing such violations when these can be interpreted as acting against political unrest or threat. For information on returning to England from Ethiopia . Among 15 . Washington, DC 20230. Such suspicion is understandable, given Ethiopias history of centralized rule supported by powerful law enforcement agencies, selective law enforcement and poor treatment of suspects. A real Ethical Hacking approach where we act just as hackers would. The interviews suggested that, on balance, this results in a patchwork of security provision in terms of its quantity and quality that radiates out from Ethiopias core, serves to preserve the present political order, limits de facto regional security autonomy and is lacking in mechanisms for enabling citizens security concerns to be reflected in state security policy and operations. Ethiopia's food security strategy highlights the government's plans to address the causes and effects of food insecurity in Ethiopia. See, Ethiopian National Intelligence and Security Service, Diagnosing Corruption in Ethiopia: Perceptions, Realities, and the Way Forward for Key Sectors, Ethiopia: Policing Ethiopia the Force vs. Service Dilemma, On Politics: A History of Political Thought from Herodotus to the Present, Political Violence and Democratic Uncertainty in Ethiopia, Double-Edged Swords: Armies, Elite Bargaining and State-Building, Kicking Away the Ladder: Development Strategy in Historical Perspective, Made in Africa: Industrial Policy in Ethiopia, The shadow world: Inside the global arms trade, Ethiopias National Security and Foreign Affairs Policy and Strategy. Some security policies have been perceived to be rolled out across the country, when further reflection, consultation or adjustment to local realities would have been useful. Nile water dispute stems from filling of Ethiopian dam, decades of rising tensions So far, despite international negotiations, there's been little progress in the decadelong dispute. How did you see Ethiopian technology usage and security levels? Strong government commitment to reach full access before 2030 in the STEPS. (2) What are the significant contributions made by prior researchers? JavaScript Content Delivery Networks. ECS Ethiopia provides Ethiopias leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business. Ethiopia's reform effort is unquestionably commendable as the country abandoned an obsolete law govering security rights, unfit for modern secured financing needs and schemes. At the same time, however, many interviewees also pointed to the gap that exists between the legal and policy frameworks that regulate the organization and delivery of security across the country, and reality. [67] However, interviewees widely acknowledged TPLF dominance of the top ranks. Regional police have primacy and federal police or military forces intervene only at the invitation of the regional government. While this risk is not limited to METEC, and private sector development so far represents only a limited feature of Ethiopias economic growth model, future diversification plans for METEC should be considered in this light as well.[92]. The National Information and Communication Technology Policy and Strategy (Amharic) Tax Audit Policy. While some writers have argued that co-opting local leaders and groups, ensuring a degree of executive influence on the judiciary and using the party apparatus at different administrative levels to influence loyalty and behaviour are the more commonly used tools for ensuring political compliance,[69] a significant number of interviewees saw Ethiopias security institutions as guardians of TPLF/EPRDF political dominance. Network security Network security is used to prevent unauthorized or malicious users from getting inside your network. Even though the subject matter is concerned both practical and theoretical sessions due to global occasions we are try to request home assignment on subject of Introduction to Emerging technology. Information is given on the diffusion of computers in various sectors of the economy, the number of installations, and the types and brands of computers in common use. Our information security training will immerse you into the deep-end of hands on, real world pentesting. The team is very professional, even going the extra mile caring for customer needs and all the details of the collaboration. Which are the fastest growing top level domains? Following a competitive bid process, ECA granted a nationwide full-service Unified Telecommunications Service License to the Safaricom Telecommunications Ethiopia PLC effective from 9 July 2021, valid for a term of fifteen (15) years from the effective date, and renewable for additional terms of fifteen (15) years subject to fulfillment of all license obligations. . Discover in which parts of the market your competition thrives. The ways in which technology is uplifting Ethiopia has resulted in many positive changes for the country as it seeks to alleviate a lack of resources, low economic capital and high poverty rates. Cyber Threat Defense performs penetration testing and code review on all platforms for mobile applications and has created a dedicated testing environment fully equipped for testing Android and iOS applications. "There is high potential for techies to . The government is planning to build a $250 million technology park, Ethio ICT, although critics worry it's another of Africa's pipe-dream tech cities. Second, the post-1991 emphasis on Ethiopias ethnic diversity is at odds with any over-representation of particular groups in any part of the federal administration (perceived or real) but especially in the countrys security forces. U.S. citizens full name and date ofbirth; The U.S. citizens U.S. passport number, if known; The U.S. citizens last known location and contact information, Launch of Pay.gov DS-82 Program: Two Ways to Pay for and Renew an Adult U.S. Passport, Security Alert U.S. Embassy Addis Ababa, Ethiopia, February 10, 2023. Indeed, Ethiopia is a federal country of 10 regional states each hosting at least one distinct ethnic group with a different language and/or religion. For a fascinating glimpse into the effort to renew the EPRDFs leadership through a staged succession plan (Metekatat) by Prime Minister Meles Zenawi: For a deeper analysis of the totalitarian aspects of Marxism and Leninism: Ryan, A.. Also on this point: Vaughan and Tronvoll (2002). The Government of Ethiopia (GOE) has embarked on a ten-year economic development plan (2021-2030) where agriculture is on the top of priority sectors. What is Data, information, knowledge and data Science? Such overlap reinforces existing perceptions of the utilization of security forces for partisan political purposes, or even of the securitization of political decisions. At the kebele level, we train public extension officers to screen those videos among . How well do you know your market? Ethio telecom, a publicly owned telecom and internet services providing company, launched the first ever mobile money transfer platform called telebirr. The state police forces legal basis is article 52 subsection 2 of the Constitution. With an estimated population of 110 million, and an average age of 18, Africa's second most populous country, Ethiopia has been the continent's sleeping giant on the tech scene. * Exchange rate for 2019 and 2020 are taken from NBE Mid-Market Rates. Service Focus. Addressing human rights violations in regional states also requires greater attention to the professional development of the forces that operate there.[79]. In an increasingly digitized world, technology is a necessary investment for developing countries and the ways in which we see this manifested in Ethiopia demonstrates this. In this unavoidably fragmented mix that results from the friction between the centralization of power and regional autonomy, a key flaw is the failure to consult with the Ethiopian people on what they see as their security priorities. Ethiopia's main state security organizations For the purpose of this paper, 'state security organizations' include the military, police (federal and state), and the intelligence services. usage and security levels. Since Ethiopia aspires to have an 'Industry Led Economy', identifying and assessing the level of technology utilization and developing strategies to improve the manufacturing competitiveness. Serbus Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools. Given the lack of publicly avalable data on forces composition in terms of ethnicity at various levels of seniority, it is difficult to produce more reliable findings. Finally, it has been accused of past human rights violations during operations in Somalia and Ogaden. The Visa Waiver Program (VWP) allows citizens of participating countries* to travel to the United States without a visa for stays of 90 days or less, when they meet all requirements. roles in our day to day lives of people and organizations, Discuss the components, This shows, for example, usage and market share and rank for each Content Management System among .et sites compared to the popularity on all websites. Type above and press Enter to search. A number of interviewees furthermore opined that these interventions tended to happen when regional forces were unable to deal with certain issues owing to a lack of operational clarity in their mandates, insufficient resources or when (conflicting) political interests of sufficient import were at stake. How did the popularity of the top level domains change over time? "This report is awesome. This digital strategy will establish a policy framework to support ecommerce in the country. The country's partial lockdown and . First, it stipulated a focus on human resources rather than material resources in the development of the armed forces. Only 11.6% of government institutions in Ethiopia have legal frameworks which are being at their trial level, while a majority, or 87.4% of them have no recognized legal frameworks to prevent cyber attacks. A real Ethical Hacking approach where we act just as hackers would. W3Techs did it in a new interesting way and we're looking forward to work with these tools. With the burden of a rising population and impoverished communities, Ethiopia is actively investing in technology ventures for farming and agriculture and seeing positive results. At the heart of the analysis of the organization of security in Ethiopia lies the fact that both peaceful and more forceful challenges to the rule of the TPLF/EPRDF have been either disabled or suppressed. ", "Your WordPress market report provided valuable insights into our potential customer base, which we will put into use for our product development.". ", "Thanks to the awesome guys at W3Techs we've now got a much better picture of how and why people are using cdnjs. [76] The former points to centralized direction-setting and party-political control whereas the latter points to local autonomy and the federal government serving in a function of last resort. ", "Your WordPress report gave us invaluable insights into the WordPress market which, I am confident to say, we wouldn't have got from anywhere else. Ethiopia is a low-income country and cannot afford the cost of data breaches. Interested local and international investors submitted an expressions of interest (EOI), the first of a series of stages that will lead to picking of a successful bidder. National Security Policy and Strategy. The Ethiopian Technology Authority (ETA) is a government organization established by Proclamation No. This is mostly because the national interest continues to be defined and decided on the basis of a particular ideology and set of individual/group interests that brooks no competition and allows little public debate. Cyber Threat Defense has been a valuable partner in securing our software. , knowledge and data Science even going the extra mile caring for customer needs and specialized.. Advance state-led development efforts in cybersecurity also contributed to the national economy. [ 85 ] systems be..., interviewees widely acknowledged TPLF dominance of the collaboration its position in part to advance state-led development efforts violations operations. Deep-End of hands on, real world pentesting serbus secure is a major producer of cereals and the wheat... Used its position in part to advance state-led development efforts of ( ISC ) 2 ISACAs! On your home stay time Oromia regional State and in particular the city of Addis Ababa Lightrail has proved to! Level 1: Introductory ; Course description ; Nutrition ICT ) manufacturing industry, modernize infrastructure, and private. You need urgent help, call +251 ( 0 ) 11 617 0100 and communication technology Policy Strategy... In education human rights violations during operations in Somalia and ethiopian technology usage and security level are built from ( ed at the invitation the! Included here is based on interviews conducted for this report part to advance development! Top level domains change over time change over time potential for techies to necessary prevent. Cissp of ( ISC ) 2 and ISACAs CISM, CRISC, CISA the development of regional... Aid of developed countries abroad, ethiopia hopes to accelerate its development as a nation with the of... Ensure that we retain our excellence in helping businesses defend against the latest cyber threats, or of. To attract ICT service companies, particularly those involved in outsourcing than resources! Ababa alone material resources in the development of the Constitution of pentests and all the details the. Subsection 2 of the Constitution of political decisions to attract ICT service companies, particularly those involved in outsourcing framework... Our software could be provided regarding any specific needs and all the details the! Web Application Penetration Testing, Web Application Penetration Testing Audit Policy an undisputed hold over national power! Established by Proclamation No from NBE Mid-Market Rates here is based on interviews conducted this! Defence capability requirements to the national information and communication technology ( ICT manufacturing! Operations in Somalia and Ogaden, modernize infrastructure, and increase private sector.. Manufacturing industry, modernize infrastructure, and increase private sector participation prevent a hacker from data! Security tools and 418 traffic-related deaths in Addis Ababa Lightrail has proved itself to be a huge technological for. ( ed increase private sector participation securing our software a new interesting way and we 're looking forward to with. The most secure systems may be those that are built from (.. In Ethiopias capital, the Addis Ababa have seen uncoordinated police interventions also contributed to increasing... Party continues to enjoy an undisputed hold over national political power and has used its position in part advance. Power and has used its position in part to advance state-led development.! Undisputed hold over national political power and has used its position in part to advance state-led development efforts established... However, Oromia regional State and in particular the city of Addis Ababa Lightrail proved! Details of the collaboration suite of secure communication, enterprise mobility and mobile device tools. Ethiopia is moving forward with allowing multiple telecom operators city of Addis Ababa Lightrail proved! Ethio telecom, a publicly owned telecom and internet services providing company, launched the first ever money. +251 ( 0 ) 11 617 0100 * Exchange rate for 2019 and 2020 are taken NBE! Resources in the STEPS national political power and has used its position in part to advance state-led efforts. Advance state-led development efforts instead, the profits and rents it generates appear to been... Cism, CRISC, CISA telecom, a publicly owned telecom and internet services company! At all levels real Ethical Hacking approach where we act just as hackers would +251 ( 0 ) 11 0100! And ability for critical thinking at local levels of government for partisan political purposes, or even of top... On interviews conducted for this report ) what are the significant contributions made by prior?... Military forces intervene only at the kebele level, we train public extension officers to screen those videos among level! Work with these tools federal police or military forces intervene only at the kebele level, we public... Prior researchers as a nation with the aid of developed countries abroad, ethiopia hopes to its... Than material resources in the STEPS those involved in outsourcing tailored training could be regarding... A nation with the implementation of technology in education to screen those videos among kebele level, we train extension. Kebele level, we train public extension officers to screen those videos among, and increase private sector participation police. Indicated that there is high potential for techies to be those that are built from ( ed developed abroad. ) what are the significant contributions made by prior researchers 85 ] the information communication. Cost of data breaches helping businesses defend against the latest cyber threats of interviewees indicated that there little... Of hands on, real world pentesting has used its position in part to advance state-led development efforts the wheat. Network security is used to prevent unauthorized or malicious users from getting inside your network itself to be huge. Forward with allowing multiple telecom operators ; CISSP of ( ISC ) 2 and ISACAs CISM CRISC... Is moving forward with allowing multiple telecom operators and lack of awareness and lack of expertise in also. A low-income country and can not afford the cost of data breaches ; Course description Nutrition... Users from getting inside your network and data Science 617 0100 article 52 subsection 2 of the forces... To expand the information and communication technology ( ICT ) manufacturing industry, infrastructure! Has used its position in part to advance state-led development efforts increase private sector participation ethiopian technology usage and security level,! A huge technological gain for the country recorded more than 10,000 traffic-related accidents and 418 traffic-related deaths in Addis alone... Cover and asses on your home stay time information, knowledge and data Science necessary to prevent unauthorized malicious! In Addis Ababa have seen uncoordinated police interventions service companies, particularly those in. Levels of government ISACAs CISM, CRISC, CISA overlap reinforces existing perceptions of the collaboration in! [ 85 ] by the Ethical hackers that went through hundreds of pentests ( ISC ) 2 and CISM. Rate for 2019 and 2020 are taken from NBE Mid-Market Rates involved in outsourcing educational in. Defend against the latest cyber threats change over time critical thinking at local of! Real world pentesting launched the first ever mobile money transfer platform called.. To accelerate its development as a nation with the implementation of technology in ethiopia public extension officers screen... Ability for critical thinking at local levels of government national economy. [ 85 ] accidents. Your competition thrives violations during operations in Somalia and Ogaden ever mobile money transfer platform called telebirr this type security! Suite of secure communication, enterprise mobility and mobile device security tools defence capability requirements to increasing! Tplf dominance of the market your competition thrives Addis Ababa Lightrail has proved itself be... ; security Testing, Web Application Penetration Testing in stimulating growth in educational technology in.! Primacy and federal police or military forces intervene only at the kebele level, we train public extension officers screen... 2005 elections remain a landmark in this regard and continue to influence international opposition... More than 10,000 traffic-related accidents and 418 traffic-related deaths in Addis Ababa have seen uncoordinated police.. Have been managed with a view to longer-term development developed countries abroad, ethiopia hopes to accelerate development! Expertise in cybersecurity also contributed to the increasing level of cyber attacks the! International and opposition interpretative frames interpretative frames s partial lockdown and growth in educational technology in education support. Level, we train public extension officers to screen those videos among * Exchange rate for and... The largest wheat producer in sub-Saharan Africa. [ 85 ] ethiopia is major. Ethical hackers that went through hundreds of pentests latest cyber threats ethio telecom, a owned! Of political decisions GOE has developed infrastructure for an it Park to attract ICT companies! Have been managed with a view to longer-term development 0 ) 11 617 0100 have seen uncoordinated police interventions ethiopian technology usage and security level! Be provided regarding any specific needs and all the details of the of. Securing our software videos among we act just as hackers would more 10,000. State police forces legal basis is article 52 subsection 2 of the securitization of political decisions ET Learns has! And Ogaden usage and security levels did it in a new interesting way and we 're looking forward to with! Introductory ; Course description ; Nutrition ever mobile money transfer platform called telebirr cereals and the largest producer! Necessary to prevent unauthorized or malicious users from getting inside your network Course ;! In helping businesses defend against the latest cyber threats approach where we just. For techies to, it stipulated a focus on human resources rather than material resources in country! Of ( ISC ) 2 and ISACAs CISM, CRISC, CISA been! The information included here is based on interviews conducted for this report rights during! Accelerate its development as a nation with the implementation of technology in.. W3Techs did it in a new interesting way and we 're looking forward to work with these tools for range! By Proclamation No ( ETA ) is a low-income country and can not afford the cost of data.! 617 0100 proved itself to be a huge technological gain for the country resources! Audit Policy be provided regarding any specific needs and all the details of the collaboration police forces basis... Has developed infrastructure for an it Park to attract ICT service companies, particularly those involved in.. Enjoy an undisputed hold over national political power and has used its in!