24.08.2013 Views

Diagnosing Corruption in Ethiopia - Ethiomedia

Diagnosing Corruption in Ethiopia - Ethiomedia

Diagnosing Corruption in Ethiopia - Ethiomedia

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

362 <strong>Diagnos<strong>in</strong>g</strong> <strong>Corruption</strong> <strong>in</strong> <strong>Ethiopia</strong><br />

Table 8.1 (cont<strong>in</strong>ued)<br />

Risk Area 6: Theft of Equipment<br />

International experience Typical <strong>in</strong>ternational risk: High<br />

6b. False entries <strong>in</strong> accounts to conceal theft by public officials<br />

An employee responsible for warehouse records falsifies store records to conceal theft by the<br />

employee, the employee’s accomplices, or <strong>in</strong>fluential officials.<br />

In <strong>Ethiopia</strong> Current risk <strong>in</strong> <strong>Ethiopia</strong>: Low<br />

This is a low area of perceived risk <strong>in</strong> <strong>Ethiopia</strong> <strong>in</strong> terms of the total value of stolen equipment,<br />

although it is a high-risk area <strong>in</strong> terms of the number of <strong>in</strong>dividual <strong>in</strong>cidents.<br />

6a. Theft of equipment from warehouse or other facility<br />

An FEACC report states that theft of equipment is a high risk, particularly from the ETC’s warehouse.<br />

The report recommends that improvements be made to the stock control system to ensure that the<br />

correct equipment is delivered and that equipment does not go miss<strong>in</strong>g.<br />

6b. False entries <strong>in</strong> accounts to conceal theft<br />

The same FEACC report comments that there is a high figure <strong>in</strong> the ETC’s accounts for “goods<br />

<strong>in</strong> transit” and considers that, <strong>in</strong> reality, some of these goods may have gone miss<strong>in</strong>g. It also<br />

comments that there was previously a problem with theft of subscriber identity module (SIM)<br />

cards but that this has now been solved by activat<strong>in</strong>g the cards only once they are legally purchased.<br />

Interviewees noted the follow<strong>in</strong>g:<br />

• The risk of theft depended on the commodity. Much of the high-value equipment<br />

purchased by the ETC is specialist equipment that could be used only <strong>in</strong> establish<strong>in</strong>g<br />

a network. This is not considered to be at high risk. The risk of theft rises accord<strong>in</strong>g to<br />

how easily resellable the items are. For example, a theft of 15 computers from the<br />

ETC’s warehouse was reported.<br />

• Apparent theft may, <strong>in</strong> some cases, be the result of <strong>in</strong>adequate control and documentation<br />

rather than corruption <strong>in</strong>volv<strong>in</strong>g public officials.<br />

Risk Area 7: Provid<strong>in</strong>g Telecoms Services to the Public<br />

International experience Typical <strong>in</strong>ternational risk: Low<br />

Internationally, this is an area of low risk <strong>in</strong> terms of total value. Typical areas of such risk<br />

<strong>in</strong>clude the follow<strong>in</strong>g:<br />

7a. Extortion aga<strong>in</strong>st members of the public by network operator’s employees to supply<br />

telecoms services such as Internet broadband l<strong>in</strong>es or SIM cards<br />

A technician work<strong>in</strong>g for the network operator may refuse to provide the physical connection<br />

to a fixed l<strong>in</strong>e <strong>in</strong> the house of a member of the public, or may refuse to repair a defective connection,<br />

unless he or she receives a bribe or a facilitation payment.<br />

7b. Bribery by members of the public of network operator’s employees to use the network<br />

operator’s <strong>in</strong>ternal test password to make free calls<br />

7c. Bribery by members of the public of network operator’s employees to give other illegal<br />

or preferential access to telecoms services<br />

(cont<strong>in</strong>ued next page)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!