Developments in cybercrime law and practice in Ethiopia

With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer cri...

Full description

Saved in:
Bibliographic Details
Published in:The computer law and security report Vol. 30; no. 6; pp. 720 - 735
Main Author: Yilma, Kinfe Micheal
Format: Journal Article
Language:English
Published: Oxford Elsevier Ltd 01.12.2014
Elsevier
Subjects:
ISSN:2212-473X, 0267-3649, 2212-4748
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and denial of service attacks. The cybercrime rules are however slightly outdated due to changes that have occurred in the field of cybercrime since the enactment of the Code. The surge of new varieties of cybercrimes previously uncovered under the Code and the need to legislate tailored evidentiary and procedural rules for investigation and prosecution of cybercrimes have recently prompted the Ethiopian government to draft modern and comprehensive cybercrime legislation, but the draft law still needs further work on cybercrimes in light of other major legislative developments at regional and national levels. This article closely examines major developments in cybercrime law and practice in Ethiopia since the enactment of the first set of cybercrime rules and proffers recommendations towards a unified cybercrime regime.
AbstractList With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and denial of service attacks. The cybercrime rules are however slightly outdated due to changes that have occurred in the field of cybercrime since the enactment of the Code. The surge of new varieties of cybercrimes previously uncovered under the Code and the need to legislate tailored evidentiary and procedural rules for investigation and prosecution of cybercrimes have recently prompted the Ethiopian government to draft modern and comprehensive cybercrime legislation, but the draft law still needs further work on cybercrimes in light of other major legislative developments at regional and national levels. This article closely examines major developments in cybercrime law and practice in Ethiopia since the enactment of the first set of cybercrime rules and proffers recommendations towards a unified cybercrime regime.
Author Yilma, Kinfe Micheal
Author_xml – sequence: 1
  givenname: Kinfe Micheal
  surname: Yilma
  fullname: Yilma, Kinfe Micheal
  email: kinfeyilma@gmail.com, kinfey@hu.edu.et
  organization: Hawassa University, School of Law, Ethiopia
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28961174$$DView record in Pascal Francis
BookMark eNo9kE1Lw0AQhhepYK39A55yEbwk7mY3mwS8SK0fUPCi4G2Zzk5xS5rE3bTSf-8Gi3OZgXkY5n0u2aTtWmLsWvBMcKHvthk2wWc5FyrjdcYFP2PTPBd5qkpVTf5n-XnB5iFseSwpBa_UlJWPdKCm63fUDiFxbYLHNXn0bkdJAz8JtDbpPeDgkMb1cvhyXe_gip1voAk0P_UZ-3havi9e0tXb8-viYZViIYshXYuCVGnrMreFVkpDDsDLwgpCDRql5MoCRqgq1-uiBitkHWNoIbkmBJQzdvt3t_fd957CYHYuIDUNtNTtgxFa11VVKcUjenNCISA0Gw8tumD6mAX80eRVrYUoVeTu_ziKfx8ceRPQUYtknSccjO2cEdyMas3WjGrNqNbw2kS18hf-QW5z
CitedBy_id crossref_primary_10_1016_j_heliyon_2023_e22823
crossref_primary_10_1016_j_ijlcj_2023_100577
ContentType Journal Article
Copyright 2014 Kinfe Micheal Yilma
2015 INIST-CNRS
Copyright_xml – notice: 2014 Kinfe Micheal Yilma
– notice: 2015 INIST-CNRS
DBID IQODW
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.clsr.2014.09.010
DatabaseName Pascal-Francis
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Law
Applied Sciences
EISSN 2212-4748
EndPage 735
ExternalDocumentID 28961174
S0267364914001605
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6J9
7-5
71M
8P~
9JN
9JO
AACTN
AAEDT
AAEDW
AAFJI
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXKI
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABMMH
ABXDB
ACDAQ
ACGFS
ACHQT
ACNNM
ACRLP
ACZNC
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFJKZ
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIEXJ
AIKHN
AITUG
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AXJTR
BKOJK
BLXMC
CS3
DU5
EFJIC
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
PRBVW
Q38
R2-
RIG
RPZ
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SSB
SSO
SSV
SSZ
T5K
UHS
WUQ
YK3
~G-
AATTM
ABJNI
ABWVN
ACRPL
ADNMO
AEIPS
ANKPU
BNPGV
IQODW
SSH
7SC
8FD
AAYWO
ACLOT
ACVFH
ADCNI
AEUPX
AFPUW
AIIUN
AKBMS
AKYEP
EFKBS
EFLBG
JQ2
L7M
L~C
L~D
~HD
ID FETCH-LOGICAL-c535t-b15e47d972d56446a2aa075d1ec6a6c3304dac15e87bb59ad13901461306ecac3
ISICitedReferencesCount 5
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000345823500010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2212-473X
0267-3649
IngestDate Mon Sep 29 05:59:29 EDT 2025
Wed Apr 02 07:14:01 EDT 2025
Tue Dec 03 05:08:26 EST 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Cybersecurity
Cybercrime
Draft computer crime law
Computer crime
Ethiopia
Criminal code
Criminality
Legislation
Cybercriminality
Information technology
Recommendation
Dissemination
World wide web
Malware
Denial of service
Internet
Computer security
Computer attack
Language English
License CC BY 4.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c535t-b15e47d972d56446a2aa075d1ec6a6c3304dac15e87bb59ad13901461306ecac3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
OpenAccessLink https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2609534
PQID 1669888440
PQPubID 23500
PageCount 16
ParticipantIDs proquest_miscellaneous_1669888440
pascalfrancis_primary_28961174
elsevier_sciencedirect_doi_10_1016_j_clsr_2014_09_010
PublicationCentury 2000
PublicationDate 2014-12-01
PublicationDateYYYYMMDD 2014-12-01
PublicationDate_xml – month: 12
  year: 2014
  text: 2014-12-01
  day: 01
PublicationDecade 2010
PublicationPlace Oxford
PublicationPlace_xml – name: Oxford
PublicationTitle The computer law and security report
PublicationYear 2014
Publisher Elsevier Ltd
Elsevier
Publisher_xml – name: Elsevier Ltd
– name: Elsevier
References Criminal Code of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 414/2004.
Marczak, Guaarnier, Galperin, Scott-Railton, Marquis-Boire (bib36) 2014
date of publication unavailable [accessed on 01.07.14].
(bib23) July 2013
US Federal Computer Fraud and Abuse Act (18 U.S.C. 1030.).
The Federal Democratic Republic of Ethiopia (bib50) August 2009
Lau, Rubin, Smith, Trajkovic (bib35) 2000; vol. 3
A proclamation on advertisement. Federal Negarit Gazeta. Proclamation no. 759/2012.
Ethiopia: cyber security profile. International Telecommunications Union. Available from
(bib22) 2004
(bib2) 2012
Cybercrime legislation – country profiles. Council of Europe. Available from
Ethiopian Federal Police Commission establishment proclamation. Federal Negarit Gazeta. Proclamation no. 720/2011.
Kaspersky Lab Global Research and Analysis Team (Great) (bib32) 2013
INSA (bib30) 2012
(bib40) 2014
Timberg (bib52) 2014
Michael (bib38) 2009
Brown, Edwards, Marsden (bib6) 2009
Kumar (bib34) 2013
Interview with Director of INSA (bib31) December 2012
The anti-terrorism proclamation. Federal Negarit Gazeta. Proclamation no. 652/2009.
Kopstein (bib33) March 10, 2014
Proclamation to provide for the definition of powers and duties of the executive organs of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 691/2010.
Reidenberg (bib43) 2004; 1
World Internet Stats (bib56) 2012
(bib16) 2013
Cross (bib12) 2008
Marquis-Boire, Marczak, Guaarnier, Scott-Railton (bib37) 2013
(bib41) 2013
[accessed on 01.07.14].
Cyberethiopia (bib15) 2013
Sarkar (bib45) 2012
(bib27) 2009
Cyber attack: when the war goes digital a growing threat to Ethiopia. Ethiop Bus Week Rev. Available from
Ethiopia Media Forum (bib17) 2012
Federal Courts proclamation. Federal Negarit Gazeta. Proclamation no. 25/1996.
Information Network Security Agency (bib29) 2012
Brenner (bib4) 2004; 6
Constitution of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 1/1995.
EU Directive 2013/40 on attacks against information systems and replacing council framework decision 2005/222/JHA.
Berhane (bib3) 2012
Telecom fraud offense proclamation. Federal Negarit Gazeta. Proclamation no. 761/2012.
Federal Democratic Republic of Ethiopia (bib25) February 2011
Conway (bib8) 2003
Copyright and neighboring rights protection proclamation. Federal Negarit Gazeta. Proclamation no. 410/2010.
Gercke (bib26) 2011
Ethiopian Ministry of Communication and Information Technology (bib20) 2014; 1
Criminal Procedure Code of the Empire of Ethiopia. Negarit Gazeta. Proclamation no. 185/1961.
Revised Southern nations, nationalities and peoples regional state courts proclamation. Debub Negairt Gazeta. Proclamation no. 43/2002.
(bib46) 2012
(bib54) 2010
Wisconsin Computer Crimes Act, Wis Stat. § 943.70(2)(a).
Timberg (bib51) 2014
Brenner (bib5) 2010
Information Network Security Agency re-establishment proclamation. Federal Negarit Gazeta. Proclamation no. 808/2013.
National Intelligence and Security Service re-establishment proclamation. Federal Negarit Gazeta. Proclamation no. 804/2013.
References_xml – year: February 2011
  ident: bib25
  article-title: Criminal justice policy
– reference: Copyright and neighboring rights protection proclamation. Federal Negarit Gazeta. Proclamation no. 410/2010.
– reference: Information Network Security Agency re-establishment proclamation. Federal Negarit Gazeta. Proclamation no. 808/2013.
– year: 2012
  ident: bib46
  publication-title: The global competitiveness report 2012–2013, full data edition
– reference: Constitution of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 1/1995.
– volume: 1
  year: 2004
  ident: bib43
  article-title: States and internet enforcement
  publication-title: Univ Ott Law Technol J
– year: 2009
  ident: bib27
  article-title: Hackers infected three embassy websites to spread malware
  publication-title: Spam Fighter New
– year: 2012
  ident: bib45
  article-title: Central Statistics Agency of Ethiopia and 100 Chinese government websites hacked by Hitcher
– year: 2013
  ident: bib32
  publication-title: Kaspersky Secur Bull
– year: 2012
  ident: bib30
  article-title: How to remove “Teddy Afro” worm
– volume: 1
  start-page: 7
  year: 2014
  ident: bib20
  publication-title: Commun Inf Technol Stat Bull
– year: 2012
  ident: bib17
  article-title: Teddy Afro virus attacks Diaspora
– reference: US Federal Computer Fraud and Abuse Act (18 U.S.C. 1030.).
– year: 2014
  ident: bib52
  article-title: U.S. citizen sues Ethiopia for allegedly using computer spyware against him
  publication-title: Wash Post
– year: 2009
  ident: bib6
  article-title: Information security and cybercrime
  publication-title: Law and the internet
– year: 2012
  ident: bib29
  article-title: Ethiopian cyber attack statistics in 2012
– year: 2014
  ident: bib51
  article-title: Foreign regimes use spyware against journalists, even the US
  publication-title: Wash Post
– year: March 10, 2014
  ident: bib33
  article-title: Hackers without boarders
  publication-title: New Yorker
– volume: vol. 3
  year: 2000
  ident: bib35
  article-title: Distributed denial of service attacks
  publication-title: IEEE international conference on systems, man, and cybernetics
– year: 2009
  ident: bib38
  article-title: Computer viruses slow African expansion
  publication-title: Guardian
– year: 2012
  ident: bib3
  article-title: Ethiopia: two government websites hacked, defaced on Sunday
  publication-title: Horn Aff
– reference: Proclamation to provide for the definition of powers and duties of the executive organs of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 691/2010.
– reference: Cyber attack: when the war goes digital a growing threat to Ethiopia. Ethiop Bus Week Rev. Available from:
– year: 2013
  ident: bib34
  article-title: Several government websites of Ethiopiahacked and defaced by Dr. @Dr.SHA6H
  publication-title: Techworm
– year: 2011
  ident: bib26
  article-title: Understanding cybercrime: a guide for developing countries
– year: 2003
  ident: bib8
  article-title: Hackers as terrorists? Why it doesn't compute
  publication-title: Comput Fraud Secur
– reference: EU Directive 2013/40 on attacks against information systems and replacing council framework decision 2005/222/JHA.
– year: 2012
  ident: bib56
  article-title: World internet usage and population statistics
– year: 2013
  ident: bib16
  article-title: Egyptian cyber fighters attack Awramba Times website
  publication-title: Awramba Times
– year: 2013
  ident: bib41
  publication-title: Proclamation to legislate, prevent and control computer crime, draft
– reference: Criminal Procedure Code of the Empire of Ethiopia. Negarit Gazeta. Proclamation no. 185/1961.
– reference: Wisconsin Computer Crimes Act, Wis Stat. § 943.70(2)(a).
– reference: [accessed on 01.07.14].
– reference: National Intelligence and Security Service re-establishment proclamation. Federal Negarit Gazeta. Proclamation no. 804/2013.
– reference: Ethiopian Federal Police Commission establishment proclamation. Federal Negarit Gazeta. Proclamation no. 720/2011.
– reference: The anti-terrorism proclamation. Federal Negarit Gazeta. Proclamation no. 652/2009.
– reference: A proclamation on advertisement. Federal Negarit Gazeta. Proclamation no. 759/2012.
– year: 2014
  ident: bib36
  article-title: Hacking Team and the targeting of Ethiopian journalists
– reference: ; date of publication unavailable [accessed on 01.07.14].
– reference: Revised Southern nations, nationalities and peoples regional state courts proclamation. Debub Negairt Gazeta. Proclamation no. 43/2002.
– year: July 2013
  ident: bib23
  publication-title: Explanatory note to the draft computer crimes proclamation
– reference: Ethiopia: cyber security profile. International Telecommunications Union. Available from:
– year: December 2012
  ident: bib31
  article-title: Brigadier general Teklebirhan Weldearegay
  publication-title: Zemen Mag
– year: 2008
  ident: bib12
  article-title: Scene of the cybercrime
– year: August 2009
  ident: bib50
  article-title: The national information and communication technology policy and strategy
– reference: Telecom fraud offense proclamation. Federal Negarit Gazeta. Proclamation no. 761/2012.
– reference: Cybercrime legislation – country profiles. Council of Europe. Available from:
– year: 2013
  ident: bib15
  article-title: Attacks on cyberethiopia.com
– year: 2014
  ident: bib40
  article-title: Privacy International seeking investigation into computer spying on refugee in UK
– year: 2010
  ident: bib5
  article-title: Cybercrime: threats from cyberspace
– year: 2013
  ident: bib37
  article-title: You only click twice: FinFisher's global proliferation
– volume: 6
  year: 2004
  ident: bib4
  article-title: US cybercrime law: defining offences
  publication-title: Inf Syst Front
– reference: Criminal Code of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 414/2004.
– reference: Federal Courts proclamation. Federal Negarit Gazeta. Proclamation no. 25/1996.
– year: 2010
  ident: bib54
  article-title: Virus attack on Ethiopian websites
  publication-title: Afr Online News
– year: 2012
  ident: bib2
  publication-title: AU convention on confidence and security in cyberspace, version 01/09
– year: 2004
  ident: bib22
  publication-title: Explanatory note to criminal code of Ethiopia
SSID ssj0000331084
ssj0016986
Score 1.9785986
Snippet With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One...
SourceID proquest
pascalfrancis
elsevier
SourceType Aggregation Database
Index Database
Publisher
StartPage 720
SubjectTerms Applied sciences
Computer crime
Computer information security
Computer science; control theory; systems
Computer systems and distributed systems. User interface
Crime
Criminal code
Cybercrime
Cybersecurity
Denial of service attacks
Draft computer crime law
Ethiopia
Exact sciences and technology
General aspects
Governments
Information systems. Data bases
Internet
Law
Legislation. Standardization
Malware
Memory and file management (including protection and security)
Memory organisation. Data processing
Prosecutions
Software
Title Developments in cybercrime law and practice in Ethiopia
URI https://dx.doi.org/10.1016/j.clsr.2014.09.010
https://www.proquest.com/docview/1669888440
Volume 30
WOSCitedRecordID wos000345823500010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 2212-4748
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016986
  issn: 2212-473X
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1La9tAEF6cpIdCKE3TEvcRVOgtCPTY5zGUlKSUUEgKvi2r1QoUXNnYzuvfZ0a7kuX40hZ6sDAr2bJmxvPab2YI-UJlYqQpIVJ1lMa0zGlspHOxs7SEV84qa9thE-LyUk4m6udo1Ffx301F08iHBzX_r6yGNWA2ls7-Bbv7L4UFeA9MhyOwHY5_xPgBDKjFutrHwi0sdvE_mQb8b1cahacR8D6b12bopaLs2DDuof_QMky6C9sMvbqop799WRniuloYvgs_MSQTUvoMmNFXuawhRaCIMjBvMRXt3F6wGcM13yWz06Rhh6XeUosiSwYWVvgGJVvK2-cRbhBCg51aU9-BNqBeN5tiX-HgrJxTBfEh9shjO2QvE0yBXts7vTibfO_zbEkODizW4oadJa7a6Z_9M4VCKo_5e37nDQ9lf26W8L-p_MCTLdvdOiTXr8mrEElEp14CDsjINW_Izg9zf0jEUAaiuonWMhABOyNgZ9TJAJ7uZOAt-fXt7PrreRwmZMSW5WwVFylzVJRKZCUDx5abzBjwAcvUWW64xVxVaSxcJEVRMGXKFFNcFGNG7qyx-Tuy28wad0QiXlUCSGpdoThllZOFYgKxyWAME8OqMWEdKXRwzrzTpYF9usMK3mgkoUYS6kRpIOGYHG_QTc99FxUNkT5PIR4ek88dITWoNtyvMo2b3S51yoFZUlKavP_Hm38gL9dS_pHsrha37hN5Ye9W9XJxHETlCfCgc1s
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Developments+in+cybercrime+law+and+practice+in+Ethiopia&rft.jtitle=The+computer+law+and+security+report&rft.au=Yilma%2C+Kinfe+Micheal&rft.date=2014-12-01&rft.pub=Elsevier+Ltd&rft.issn=2212-473X&rft.eissn=2212-4748&rft.volume=30&rft.issue=6&rft.spage=720&rft.epage=735&rft_id=info:doi/10.1016%2Fj.clsr.2014.09.010&rft.externalDocID=S0267364914001605
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2212-473X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2212-473X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2212-473X&client=summon