A delegation from the Department of Home Affairs gave a presentation to the Portfolio Committee on Home Affairs on 26 August 2014 on the key changes brought about by the immigration legislation and regulations that had come into operation on 26 May 2014.
A delegation from the Department of Home Affairs gave a presentation to the Portfolio Committee on Home Affairs on 26 August 2014 on the key changes brought about by the immigration legislation and regulations that had come into operation on 26 May 2014.
Access Cards and Identity Management - is it worthwhile?Robert Bromwich
Presentation based on a paper Government Access Cards: A key to fraud and identity theft reduction? developed for the 25th International Convention of the Records Management Association of Australasia (RMAA) held at Sydney during September 2008.
BCJ 4385, Workplace Security 1
Course Learning Outcomes for Unit VI
Upon completion of this unit, students should be able to:
1. Evaluate security problems within private and public institutions and cultivate applicable
security measures.
2. Analyze contemporary security investigation tactics.
3. Examine intellectual property and security measures taken to protect business intelligence and
proprietary information.
Reading Assignment
Chapter 9:
Investigations, Intelligence Operations, and Reporting
Chapter 10:
Institutional Security, Disaster Recovery, and Executive Protection
Unit Lesson
General Overview
When people hear the term investigation the first thing that comes to mind is what they saw on a dramatized
crime show or TV program. In actuality there are several types of investigations. There are human resource
investigations that investigate issues related to employee backgrounds, workplace violence, employment
discrimination, worker compensation, sexual harassment, sexual abuse, substance abuse, and wrongful
termination. There are also personal injury and property damage investigations, and criminal investigations
which include undercover investigations. Another aspect of criminal investigations is business crime
investigations which involves investigations concerning crimes committed against businesses by employees
(e.g., fraud and embezzlement), crimes committed against businesses by outsiders (e.g., arson and robbery),
and crimes committed by individuals on behalf of businesses (e.g., tax evasion and commercial bribery).
Information collected in investigations is derived from various sources which “include physical evidence,
specialized databases, victims, witnesses, suspects, records, informants, and the Internet” (Ortmeier, 2013, p.
212). Once information is gathered it is then analyzed. The analysis of physical evidence is associated with
forensic science and criminalistics. Such analyses are traditionally conducted in the laboratory. DNA testing is
one of several analysis techniques used by forensic scientists. Other techniques include psychological
profiling, anthropological strategies, forensic accounting, biology, chemistry, ballistics testing, and many more.
Every investigation is governed by a code of conduct. Both private and public law enforcement and security
agencies are governed by investigative statutes which govern overt and covert investigative techniques (e.g.,
the Omnibus Crime Control and Safe Streets Act of 1968 and the Employee Polygraph Protection Act of
1988). While the fourth amendment to the Constitution only restricts government conduct, private and
nongovernment employees may also have an expectation of privacy if their employers knowingly or knowingly
create an expectation of privacy among their employees.
Intelligence operations are not limited to criminal investigations. They also include business intelligence
operations, which is also ...
New study on labour migration channels to Thailand from Cambodia, Myanmar, and Lao PDR
https://www.verite.org/wp-content/uploads/2019/05/Thailand-Bound-An-Exploration-of-Migration-Infrastructures-in-Cambodia-Myanmar-Lao-PDR-1.pdf
New criminal laws— Future of criminal justice system in Indiaaakash malhotra
The three new criminal laws, the Bharatiya Nyaya Sanhita, the Bharatiya Nagarik Suraksha Sanhita, and the Bharatiya Sakshya Adhiniyam, which replace the Indian Penal Code (IPC), the Code of Criminal Procedure (CrPC), and the Indian Evidence Act respectively, will come into force from 1 July this year
In recent years, the rise of cryptocurrencies has captured the attention of individuals, businesses, and governments worldwide. As this digital revolution continues to reshape the financial landscape, it becomes increasingly important to understand the role and impact of cryptocurrency legislation.
A presentation on AML & CFT Risks and Opportunities delivered at the Gibraltar Association of Compliance Officers Blockchain & DLT Event on 17 October 2018.
This presentation covers different industry players; what obligations those industry players may have; how to meet those compliance obligations; other key risks and the future of compliance in the cryptocurrency and DLT sector.
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
The US Department of Justice released a report regarding #cryptocurrency enforcement with strategies to take related to #digitalassets and interest in how enforcement will work in the #decentralizedfinance space.
The report could serve to shape the future vision of authorities and regulators towards #cryptocurrencies.
CHINA and AFRICA: Understanding the natural resource dynamicIPSS-Addis
IPSS lecture by Professor Ian Taylor, Professor in International Relations and African Political Economy at the University of St. Andrews, United Kingdom
Alex de Waal, The Real Politics of the Horn of Africa IPSS-Addis
Alex de Waal, Executive Director of the World Peace Foundation Research Professor at The Fletcher School, Tufts University, launched a book in collaboration with IPSS at Hilton Hotel, Addis Ababa
More Related Content
Similar to The Evolution of PMSCs in Ethiopia by Solomon Hassen
Access Cards and Identity Management - is it worthwhile?Robert Bromwich
Presentation based on a paper Government Access Cards: A key to fraud and identity theft reduction? developed for the 25th International Convention of the Records Management Association of Australasia (RMAA) held at Sydney during September 2008.
BCJ 4385, Workplace Security 1
Course Learning Outcomes for Unit VI
Upon completion of this unit, students should be able to:
1. Evaluate security problems within private and public institutions and cultivate applicable
security measures.
2. Analyze contemporary security investigation tactics.
3. Examine intellectual property and security measures taken to protect business intelligence and
proprietary information.
Reading Assignment
Chapter 9:
Investigations, Intelligence Operations, and Reporting
Chapter 10:
Institutional Security, Disaster Recovery, and Executive Protection
Unit Lesson
General Overview
When people hear the term investigation the first thing that comes to mind is what they saw on a dramatized
crime show or TV program. In actuality there are several types of investigations. There are human resource
investigations that investigate issues related to employee backgrounds, workplace violence, employment
discrimination, worker compensation, sexual harassment, sexual abuse, substance abuse, and wrongful
termination. There are also personal injury and property damage investigations, and criminal investigations
which include undercover investigations. Another aspect of criminal investigations is business crime
investigations which involves investigations concerning crimes committed against businesses by employees
(e.g., fraud and embezzlement), crimes committed against businesses by outsiders (e.g., arson and robbery),
and crimes committed by individuals on behalf of businesses (e.g., tax evasion and commercial bribery).
Information collected in investigations is derived from various sources which “include physical evidence,
specialized databases, victims, witnesses, suspects, records, informants, and the Internet” (Ortmeier, 2013, p.
212). Once information is gathered it is then analyzed. The analysis of physical evidence is associated with
forensic science and criminalistics. Such analyses are traditionally conducted in the laboratory. DNA testing is
one of several analysis techniques used by forensic scientists. Other techniques include psychological
profiling, anthropological strategies, forensic accounting, biology, chemistry, ballistics testing, and many more.
Every investigation is governed by a code of conduct. Both private and public law enforcement and security
agencies are governed by investigative statutes which govern overt and covert investigative techniques (e.g.,
the Omnibus Crime Control and Safe Streets Act of 1968 and the Employee Polygraph Protection Act of
1988). While the fourth amendment to the Constitution only restricts government conduct, private and
nongovernment employees may also have an expectation of privacy if their employers knowingly or knowingly
create an expectation of privacy among their employees.
Intelligence operations are not limited to criminal investigations. They also include business intelligence
operations, which is also ...
New study on labour migration channels to Thailand from Cambodia, Myanmar, and Lao PDR
https://www.verite.org/wp-content/uploads/2019/05/Thailand-Bound-An-Exploration-of-Migration-Infrastructures-in-Cambodia-Myanmar-Lao-PDR-1.pdf
New criminal laws— Future of criminal justice system in Indiaaakash malhotra
The three new criminal laws, the Bharatiya Nyaya Sanhita, the Bharatiya Nagarik Suraksha Sanhita, and the Bharatiya Sakshya Adhiniyam, which replace the Indian Penal Code (IPC), the Code of Criminal Procedure (CrPC), and the Indian Evidence Act respectively, will come into force from 1 July this year
In recent years, the rise of cryptocurrencies has captured the attention of individuals, businesses, and governments worldwide. As this digital revolution continues to reshape the financial landscape, it becomes increasingly important to understand the role and impact of cryptocurrency legislation.
A presentation on AML & CFT Risks and Opportunities delivered at the Gibraltar Association of Compliance Officers Blockchain & DLT Event on 17 October 2018.
This presentation covers different industry players; what obligations those industry players may have; how to meet those compliance obligations; other key risks and the future of compliance in the cryptocurrency and DLT sector.
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
The US Department of Justice released a report regarding #cryptocurrency enforcement with strategies to take related to #digitalassets and interest in how enforcement will work in the #decentralizedfinance space.
The report could serve to shape the future vision of authorities and regulators towards #cryptocurrencies.
CHINA and AFRICA: Understanding the natural resource dynamicIPSS-Addis
IPSS lecture by Professor Ian Taylor, Professor in International Relations and African Political Economy at the University of St. Andrews, United Kingdom
Alex de Waal, The Real Politics of the Horn of Africa IPSS-Addis
Alex de Waal, Executive Director of the World Peace Foundation Research Professor at The Fletcher School, Tufts University, launched a book in collaboration with IPSS at Hilton Hotel, Addis Ababa
THE SUDAN AND SOUTH SUDAN CONFLICT OVER ABYEI SINCE THE 2005 COMPREHENSIVE PE...IPSS-Addis
This is Getachew Zeru's presentation. Getachew is a PhD student at the Regular PhD programme, IPSS http://www.ipss-addis.org/new-ipss/content/3b03ff2295f7308fafc2/?ms=03713eab7dda03f09b55&ps=7823486jjsf687jjjkkf&ls=3b03ff2295f7308fafc2&sub=75625ad99187409302b4. He is the first to successfully defend his PhD research since the launch of the PhD programme in 2010.
Presentation on the Tana High Level Forum on Security in AfricaIPSS-Addis
This is a presentation on the Tana High-Level Forum on Security in Africa. The fourth edition of the Tana Forum will be held on the 18th and 19th April 2015 in Bahir Dar, Ethiopia under the theme "Secularism and Politicised Faith".
IPSS Recommendations for preventing, monitoring and intervention of election-...IPSS-Addis
This slideshow presentations is a series of recommendations on the prevention, monitoring, and intervention of election-related conflicts in Africa presented by the IPSS to the 479th Open Session of the African Union Peace and Security Council
The Civilian Dimension- Research, Training and Policy-making Beyond and Away ...IPSS-Addis
This presentation made by Dr. Simon Akindes, Education and Professional Development Lead at the Institute for Peace and Security Studies (IPSS), provides the civilian perspective to peace support operations in Africa. It was presented during the 12th annual general meeting of the Association of Peace Support Trainers in Africa (APSTA) at the African Union Commission in Addis Ababa, Ethiopia (9th December 2014).
E-learning project: Conflict management for government officials in the Horn ...IPSS-Addis
This slideshow presents the Conflict management for government officials in the Horn of Africa E-learning project at the Institute for Peace and Security Studies (IPSS)
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsRosie Wells
Insight: In a landscape where traditional narrative structures are giving way to fragmented and non-linear forms of storytelling, there lies immense potential for creativity and exploration.
'Collapsing Narratives: Exploring Non-Linearity' is a micro report from Rosie Wells.
Rosie Wells is an Arts & Cultural Strategist uniquely positioned at the intersection of grassroots and mainstream storytelling.
Their work is focused on developing meaningful and lasting connections that can drive social change.
Please download this presentation to enjoy the hyperlinks!
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
The Evolution of PMSCs in Ethiopia by Solomon Hassen
1. Perspectives and experiences of the Ethiopian
PMSCs: challenges and opportunities for its
regulation
November 12, 2015
2. THE EVOLUTION OF PMSCS IN
ETHIOPIA
No evidence of the establishment of private security structures
during the Derg regime (kinfe, 2004).
The growth of PMSCs in Ethiopia follows the continental dynam-
ic: fits into a global process of commodification of security.
The evolution of PMSCs can be attributed to three periods;
1. Changing of government (early part of the 1990’s, initial period)
high demobilized soldiers plus high unemployment. (Tila; 1992, and
Sebhatu and his Sons Security Service, created in 1992)
3. CONT,,,
2. Economic growth and high privatization since 2005 (expansion
period) increased demand for security
3. 2008-2009 (intensification period). This comes following the
government’s introduction of BPR,
Four categories of PMSCs owners:
1. Senior ex-police officers including the former commissioner of the
A.A. police and retired generals;
2. A group of demobilized soldiers and ex-service men who organized
themselves and opened PMSCs;
4. CONT,,,
3. Supervisors who used to work the bigger PSCs and decided to
resign and open their own;
4. Business people who forcefully and indirectly joined the sector.
5. II. Size of the industry;
It is difficult to estimate the size of the sector with accuracy. The
estimated number of PSC would be anything from 100 to 130; (about
100 in Addis).
Some of the big companies have an annual cash flow of 40 to 50
million birr each (they employ from 2800 to 9, 000 employees).
The sector is estimated to run multibillion birr.
Majority of the companies are of middle size meaning each of
them employs not less than 1,000 guards. )
6. R ECRUITMENT, WOR KING CONDITION
T R A INING A ND LOG IST ICS
Grade eight and above (female) grade six and above for male “The least
educated the better.”
Training of personnel (none, to one day, (small PSCs) one week to one month
(big ones).
Working condition: The guards are deployed following a shifting system; a guard
after 24 hours of service is off duty for the following 48 hours
No proper and regular logistics; uniforms, rain-coat, torches, shoes and night
dresses.
7. CONT,,,
Kind of service provision; guarding, VIP protection, screening;
admitting customers to clients’ premises; ID checking, surveillance,
property and infrastructure protection.
The absence of gun license law seen by some in the sector as a key
challenge.
Selective arming; not arming at all and arming together with
regulation advocated as a future models,
8. SALARY AND BENEFITS
most estimates converge around similar sums (700 birr per
month).
While the minimum salary in the smaller companies is 500 birr in
the bigger ones it ranges from 800 to 1300 birr with the maximum
being 3600 plus medical insurance and other benefits .
High unemployment+ youth population= low salary and poor
bargaining capacity.
9. LICENSE REQUIREMENTS
The Ethiopian Trade proclamation no 020/2/6056/2008 does not specify the
guarding and security provision sector as a type of business,
As per Federal Negarit Gazeta proclamation No. 720/2011 Article 28 “the FP
can issue certificates of competence to private institutions wishing to engage in
providing security service”.
The request to getting a license has to be submitted to the FP Professional
Counseling and Arms License Division together with a form prepared to this effect.
10. CONT,,,
Categories of Certificates; There are two types of certificates stated
by the FP; level one and two.
Level one covers those PSCs that provide protection for embassies,
INO, NGOs, big gov’t infrastructure, diplomats, Banks, five star hotels,
and all clients mentioned in level two.
Level two certificates only allow security provision for individuals that
are not covered in level one.
No objective criteria stated in terms of a minimum capital or
equipment (except owning one car and three room building)
11. BEST PRACTICES TO BE TAKEN
FROM THE ETHIOPIAN SECTOR;
Reserving the sector to nationals only during the period where
there is no proper legislation and regulatory mechanisms;
Close working relationship with local community (e.g Rail way
route)
Not directly arming the sector in the absence of proper regulation
12. CHALLENGES FACED;
Absence of a regulatory regimes; lack of professionalization and little
application of international best practices; unstructured or poor
partnership with the police (little sharing of info); little or no training for
personnel;
There is almost no working relationship between the different PMSCs.
Lack of the required capacity by the FP to effectively discharge its
duties; (no continuous background checks, monitoring compliance with
terms of license or sanctioning bad actors.
13. CONT,,,
The FP is under staffed; less than 20 staff involved in the licensing
monitoring and controlling of PMSC that have close to five hundred
thousand personnel.
Unhealthy competition in the sector due to the lack of standard,
this limits the growth of the sector and the provision of a quality
service.
14. A D O P T I N G T H E M O N T R E U X D O C U M E N T
This can help the Ethiopian gov’t review the conformity of domestic legislation and
practice with international humanitarian and HR laws.
Can help to establish a procedure for the selection and contracting of PMSCs and
ensure that it is transparent and is supervised;
To select PMSCs according to; past conduct, possession required authorizations;
personnel and property records, adequate training in international humanitarian law and
human rights law; lawful acquisition and use of equipment (in particular weapons)
It could be used for monitoring compliance and ensuring accountability; for
contractual sanctions commensurate to the conduct (immediate or graduated termination
of the contract; financial penalties etc)
15. T HE WAY FORWA R D A ND
R ECOMMENDA TIONS
The declaration of tighter regulations and legislation and the
inclusion of international best practices (Montreux Document).
The imposition of sector-wide standards for training.
The introduction of minimum wage for the guards, to be raised
over time.(like that of employees in other sectors).
The allocation of adequate financial and human resources to the
FP .
16. CONT,,,
The FP should develop a registration system and maintain a computerized data
base consisting of all registered security officers and PMSCs;
It should undertake finger print classification of all those wanting to enter the
industry,
The PMSCs should be required to assure clear identification of staff and
vehicles (IDs, clearly distinguishable uniforms, special number plates for vehicles);
17. CONT,,,
Working conditions; set a minimum amount of capital required to start
a security firm; set minimum wages, academic qualifications, codes of
conduct,
The kind of client and service that is required by the PMSCs should
be specified.
The introduction of a license fee by the PMSCs has been suggested as
a remedy to increase ownership by the PMSCs and the monitoring
capacity of the FP.