{"id":405,"date":"2006-09-01T06:19:49","date_gmt":"2006-08-31T23:19:49","guid":{"rendered":""},"modified":"2006-09-01T06:19:49","modified_gmt":"2006-08-31T23:19:49","slug":"outrage-at-zimbabwe-bugging-plan","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2006\/09\/outrage-at-zimbabwe-bugging-plan\/","title":{"rendered":"Outrage at Zimbabwe bugging plan"},"content":{"rendered":"<p>Zimbabwe&#8217;s opposition and civil society groups have expressed anger at a proposed law to monitor communications.<br \/>\nThe bill proposes a monitoring centre, apparently with Chinese technology, that would eavesdrop on telephone, internet and other communications.<!--more--><\/p>\n<p>The government says the bill is similar to anti-terror laws elsewhere to protect people from organised crime.<\/p>\n<p>Parliament began public hearings on the Interception of Communications Bill on Wednesday amid heated exchanges.<\/p>\n<p>&#8220;One of the key obligations on internet service providers (ISPs) is to install equipment which would allow them to interface between the ISP and the monitoring service,&#8221; Jim Holland, spokesman for the Zimbabwe Internet Service Providers&#8217; Association, told the BBC News website.<\/p>\n<p>Technology<\/p>\n<p>This equipment would have to be installed at the expense of the ISP.<\/p>\n<p>Mr Holland said his organisation would seek clarification on whether the bill applied to all companies that provide internet services to the public.<\/p>\n<p>The advancement in technology today means that no one is safe at all from the source of terrorism<br \/>\nBrig Gen Mike Sango<\/p>\n<p>Have Your Say<\/p>\n<p>Asked whether Zimbabwe had the technological capacity to implement the changes proposed in the bill, Mr Holland said: &#8220;I would imagine it is now here. There are obviously now close links with the Chinese, who are specialists in the interception of radio and internet communication.&#8221;<\/p>\n<p>Zimbabwean telephone calls are already monitored.<\/p>\n<p>&#8220;The Posts and Telecommunications Regulatory Authority said the interface was already there &#8211; all that is required is to connect to the monitoring centre,&#8221; Mr Holland said.<\/p>\n<p>Monitoring internet communication is nevertheless more complicated than monitoring phone calls, and Zimbabweans using an overseas-based webmail service would be able to avoid bugging by the authorities in Zimbabwe.<\/p>\n<p>The government has defended the proposal in the name of national security.<\/p>\n<p>&#8220;The advancement in technology today means that no one is safe at all from the source of terrorism, mercenarism and organised crime,&#8221; Brig Gen Mike Sango of the Zimbabwe Defence Force told the hearing.<\/p>\n<p>&#8220;A piece of legislation has been long overdue on this particular problem.&#8221;<\/p>\n<p>more from [url=http:\/\/news.bbc.co.uk\/2\/hi\/africa\/5301146.stm]BBC[\/url]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Outrage at Zimbabwe bugging plan<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-405","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-6x","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=405"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/405\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}