SlideShare a Scribd company logo
1 of 11
Yemen Internet Filtering  ,[object Object]
POLITICAL, TECHNICAL, AND LEGAL CONTEXT IN YEMEN ,[object Object]
Yemen has demonstrated particular sensitivity to media coverage of security issues since the bombing of the United States warship U.S.S. Cole off its shores in October 2000. Criticism of the government has resulted in arrests of journalists
Yemen works to control reporting on its armed forces
[object Object]
Telephone density is the lowest in the region, due to the population's poverty and the difficult physical geography.
Estimates of the number of Internet users vary between 100,000and 150,000
Barriers to expanded use include the high cost of computers relative to low average incomes, the high cost of access, and the low bandwidth available on Yemen's telephone-based infrastructure.
Businesses own 60% of Internet subscriber accounts, while government and educational institutions are responsible for only 3% of accounts
[object Object]
Despite the relatively free press in Yemen during the 1990s, Yemeni journalists reportedly suffered some harassment at the hands of the state. In particular, journalists at the Yemen Times were frequently targeted with violence, threats, and arbitrary imprisonment.

More Related Content

What's hot

The Chintranet
The ChintranetThe Chintranet
The Chintranetpaangsam
 
Media Laws in the Philippines
Media Laws in the PhilippinesMedia Laws in the Philippines
Media Laws in the PhilippinesRachel Khan
 
Censorship down under
Censorship down underCensorship down under
Censorship down underErhan Boduk
 
Kenyan media freedom
Kenyan media freedom Kenyan media freedom
Kenyan media freedom HENRY NEONDO
 
Executive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia FarinaExecutive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia Farinanslscornell
 
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORYSOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORYWasiu Otukoya
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...International Islamic University Malaysia
 
Journalism Finals 09
Journalism Finals 09Journalism Finals 09
Journalism Finals 09guest3dd682
 
Japan's State Secrets Law (3/11/14)-By Eric Johnston
Japan's State Secrets Law (3/11/14)-By Eric JohnstonJapan's State Secrets Law (3/11/14)-By Eric Johnston
Japan's State Secrets Law (3/11/14)-By Eric JohnstonEric Johnston
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
 
The Future of Net Neutrality: What's at stake for Canadians
The Future of Net Neutrality: What's at stake for CanadiansThe Future of Net Neutrality: What's at stake for Canadians
The Future of Net Neutrality: What's at stake for CanadiansCybera Inc.
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 

What's hot (17)

The Chintranet
The ChintranetThe Chintranet
The Chintranet
 
12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia
 
Media Laws in the Philippines
Media Laws in the PhilippinesMedia Laws in the Philippines
Media Laws in the Philippines
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
Kenyan media freedom
Kenyan media freedom Kenyan media freedom
Kenyan media freedom
 
Executive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia FarinaExecutive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia Farina
 
Media law 1
Media law   1Media law   1
Media law 1
 
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORYSOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Journalism Finals 09
Journalism Finals 09Journalism Finals 09
Journalism Finals 09
 
Turkmenistan
Turkmenistan Turkmenistan
Turkmenistan
 
Japan's State Secrets Law (3/11/14)-By Eric Johnston
Japan's State Secrets Law (3/11/14)-By Eric JohnstonJapan's State Secrets Law (3/11/14)-By Eric Johnston
Japan's State Secrets Law (3/11/14)-By Eric Johnston
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
The Future of Net Neutrality: What's at stake for Canadians
The Future of Net Neutrality: What's at stake for CanadiansThe Future of Net Neutrality: What's at stake for Canadians
The Future of Net Neutrality: What's at stake for Canadians
 
Media law in India
Media law in IndiaMedia law in India
Media law in India
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 

Viewers also liked

Viewers also liked (20)

Geography yemen presentation
Geography yemen presentationGeography yemen presentation
Geography yemen presentation
 
أضرار القات
أضرار القاتأضرار القات
أضرار القات
 
Yemen conflict
Yemen conflictYemen conflict
Yemen conflict
 
CURRICULUM VITAE النسخة الانجليزي
CURRICULUM VITAE النسخة الانجليزيCURRICULUM VITAE النسخة الانجليزي
CURRICULUM VITAE النسخة الانجليزي
 
Yemen powerpoint
Yemen powerpointYemen powerpoint
Yemen powerpoint
 
Yemen
YemenYemen
Yemen
 
Yemen ppt.
Yemen ppt.Yemen ppt.
Yemen ppt.
 
The Yemen Crisis (1)
The Yemen Crisis (1)The Yemen Crisis (1)
The Yemen Crisis (1)
 
قصتي مع القات
قصتي مع القاتقصتي مع القات
قصتي مع القات
 
Republic of yemen
Republic of yemenRepublic of yemen
Republic of yemen
 
Socotra Island
Socotra IslandSocotra Island
Socotra Island
 
Crisis in Yemen
Crisis in YemenCrisis in Yemen
Crisis in Yemen
 
Sunni vs shiite
Sunni vs shiiteSunni vs shiite
Sunni vs shiite
 
Kobi marom presentation
Kobi marom presentationKobi marom presentation
Kobi marom presentation
 
Saudi Yemen conflict.
Saudi Yemen conflict.Saudi Yemen conflict.
Saudi Yemen conflict.
 
Yemen
YemenYemen
Yemen
 
Yemen
YemenYemen
Yemen
 
Lecture # 64 yemen crisis explained
Lecture # 64   yemen crisis explainedLecture # 64   yemen crisis explained
Lecture # 64 yemen crisis explained
 
Construction en terre
Construction en terreConstruction en terre
Construction en terre
 
Manhattan of the desert-Yemen's Ancient Mud Skyscraper City
Manhattan of the desert-Yemen's Ancient Mud Skyscraper CityManhattan of the desert-Yemen's Ancient Mud Skyscraper City
Manhattan of the desert-Yemen's Ancient Mud Skyscraper City
 

Similar to Yemen Limits Internet Access Through ISP Filtering

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Ecrea2a Mbala Pascal Paper
Ecrea2a Mbala Pascal PaperEcrea2a Mbala Pascal Paper
Ecrea2a Mbala Pascal Paperimec.archive
 
Digital Communications and Democracy
Digital Communications and DemocracyDigital Communications and Democracy
Digital Communications and DemocracyCrystal Cook Marshall
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Techcyruskarimian
 
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Fatemeh Ahmadi
 
THE ABSENCE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) POLICIES AND TECHNO...
THE ABSENCE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) POLICIES AND TECHNO...THE ABSENCE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) POLICIES AND TECHNO...
THE ABSENCE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) POLICIES AND TECHNO...jah22
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile lawJacqueline Fick
 
Content standards presentation for London Metropolitan University
Content standards presentation for London Metropolitan UniversityContent standards presentation for London Metropolitan University
Content standards presentation for London Metropolitan UniversityDamian Radcliffe
 

Similar to Yemen Limits Internet Access Through ISP Filtering (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Ecrea2a Mbala Pascal Paper
Ecrea2a Mbala Pascal PaperEcrea2a Mbala Pascal Paper
Ecrea2a Mbala Pascal Paper
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Digital Communications and Democracy
Digital Communications and DemocracyDigital Communications and Democracy
Digital Communications and Democracy
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Tech
 
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
 
THE ABSENCE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) POLICIES AND TECHNO...
THE ABSENCE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) POLICIES AND TECHNO...THE ABSENCE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) POLICIES AND TECHNO...
THE ABSENCE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) POLICIES AND TECHNO...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
 
Content standards presentation for London Metropolitan University
Content standards presentation for London Metropolitan UniversityContent standards presentation for London Metropolitan University
Content standards presentation for London Metropolitan University
 

Yemen Limits Internet Access Through ISP Filtering

  • 1.
  • 2.
  • 3. Yemen has demonstrated particular sensitivity to media coverage of security issues since the bombing of the United States warship U.S.S. Cole off its shores in October 2000. Criticism of the government has resulted in arrests of journalists
  • 4. Yemen works to control reporting on its armed forces
  • 5.
  • 6. Telephone density is the lowest in the region, due to the population's poverty and the difficult physical geography.
  • 7. Estimates of the number of Internet users vary between 100,000and 150,000
  • 8. Barriers to expanded use include the high cost of computers relative to low average incomes, the high cost of access, and the low bandwidth available on Yemen's telephone-based infrastructure.
  • 9. Businesses own 60% of Internet subscriber accounts, while government and educational institutions are responsible for only 3% of accounts
  • 10.
  • 11. Despite the relatively free press in Yemen during the 1990s, Yemeni journalists reportedly suffered some harassment at the hands of the state. In particular, journalists at the Yemen Times were frequently targeted with violence, threats, and arbitrary imprisonment.
  • 12.
  • 13. Standard analog dial-up service from TeleYemen costs 3,000 Yemen rials (U.S.$16.48) for installation, and a maximum per-minute charge of five rials (U.S.$0.027), with a minimum monthly charge of 300 rials (U.S.$1.65). (Note that per capital GDP in Yemen is approximately U.S.$800 a year, and the state is one of the world's least-developed economically.)
  • 14. Dial-up service from YemenNet costs 5,000 rials (U.S.$27.47) for installation, with a per-minute charge of one rial (U.S.$0.0055) and no monthly fee. High-speed services are also available, but are even more expensive.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. enumerate ISPs and national routing topography;
  • 21. determine the type, location, and behavior of the filtering technology;
  • 22. deploy network interrogation and enumeration software at multiple access points; and
  • 23. conduct a thorough statistical analysis of results.
  • 24.