Saturday, March 14, 2026
- Advertisment -
Google search engine
Home Blog Page 3

GirlsDoPorn Owner Michael Pratt Jailed 27 Years for Sex Trafficking Hundreds of Women

0

Michael Pratt, the mastermind of the sprawling GirlsDoPorn sex trafficking empire, was sentenced in federal court Monday to 27 years in prison for orchestrating a scheme that deceived and exploited hundreds of women and left a trail of broken lives.

Pratt, the owner and operator of GirlsDoPorn.com and GirlsDoToys.com, built a multimillion-dollar criminal empire by luring young women into pornography through lies, coercion, and manipulation, and then broadcasting their abuse to millions online.

At Monday’s hearing, 40 women urged the court to hand down the maximum sentence, some tearfully describing their ordeals in San Diego hotel rooms where they were exploited, coerced, raped, abused and trapped.

Some talked about the aftermath of trauma that included many years of suicide attempts; diagnoses of depression, anxiety and post-traumatic stress disorder; lost jobs and relationships; stalkers and threats and harassment; and the heavy burden of shame and fear they still carry.

Some told of having cosmetic surgery to alter their appearance; several testified that they changed their names; others spoke of substance abuse and alcoholism; one said she had a glass of wine for breakfast just to make it to court today. Most of the victims were 18-21 years old when they were exploited.

Pratt and his co-conspirators posted misleading modelling ads, preyed on vulnerable women, and promised their sex videos would never be seen online. In reality, Pratt’s employees posted the videos onto his websites, which featured young women appearing in their first pornographic videos.

They even promoted them on free pornography platforms like PornHub to drive traffic. Victims were coerced into finishing shoots under threats of lawsuits, cancelled flights, and exposure. Some were effectively trapped in hotel rooms by camera equipment blocking the exits.

“Pratt has caused me to fear my own name,” one woman said.

“The life I was meant to have, died in that hotel room,” another told the court.

“Profit over people. Cruelty over humanity,” another said.

Many spoke directly to Pratt:

“I am not your victim. I’m your reckoning…I am the girl who took you down,” said a victim who was a 21-year-old law student at the time. “Look around! We are an army of survivors sharing our truth and we have won.”

Another woman, who was a 19-year-old dance teacher to children but was fired, told Pratt: “You are evil. You are a predator. You are a rapist. This is who you are. Your ego was too big to believe you’d ever get caught but karma comes around. It is your turn now to suffer.”

A woman who was a 21-year-old college student studying to become a teacher said: “This crime dismantled my identity. I lost my voice and sense of safety…The shame and despair were unbearable.”

Another woman who was a college-bound high school senior but dropped out because of her ordeal said: “This was a theft of my identity, my safety, my dreams and my peace.”

After hearing about five hours of testimony from the women, U.S. District Judge Janis L. Sammartino told the defendant that his position as the leader, organiser and mastermind of the massive trafficking organisation compelled her to add time to the sentence.

“I’ve been doing this a very long time and I’ve never had a case like this before, of this magnitude…The sheer scope and magnitude of this offence causes this court to vary upward,” said the judge.

Throughout the conspiracy, GirlsDoPorn and GirlsDoToys received millions of views. To promote the websites, video content from both sites was posted on free porn sites such as Pornhub.com, one of the world’s most visited websites.

The videos from GirlsDoPorn and GirlsDoToys posted on PornHub were often viewed millions of times, according to PornHub’s own view counters. The websites charged visitors a subscription fee to access content and generated millions of dollars in revenue for Pratt.

To recruit young women to appear in videos for the websites, Pratt and some of his employees (at Pratt’s direction) often told the prospective models that their sex videos would never be posted on-line, that the videos would never be released in the United States, and that no one who knew the women would ever find out about their video, representations that Pratt and other members of the conspiracy knew were false. Women from various places throughout the United States and Canada were recruited to appear in videos based on these material misrepresentations.

Even after Pratt learned that victims’ names and personal details were being doxxed on pornwikileaks.com, he pressed forward with his scheme, reaping millions in profit while ignoring desperate pleas from women begging him to take their videos down.

The GirlsDoPorn investigation and prosecution spanned years, involving FBI agents, FBI analysts, the U.S. Marshal Service, victim advocates, and prosecutors who worked tirelessly to secure justice for the victims. Multiple co-conspirators have been convicted in connection with the scheme, but Pratt’s sentencing marks the most significant step in dismantling the criminal network he created.

Pratt was charged in October 2019 in the Southern District of California with sex trafficking crimes in connection with the scheme to deceive and coerce young women to appear in pornographic videos. Pratt liquidated his assets and fled the United States in mid-2019. He was named to the FBI’s Top Ten Most Wanted list and lived as an international fugitive for more than three years until his arrest in Spain in December 2022 and extradition to San Diego in March 2024.

Pratt pleaded guilty on June 5, 2025, to Conspiracy to Commit Sex Trafficking by Force, Fraud and Coercion; and Committing Sex Trafficking by Force, Fraud and Coercion. Prosecutors argued for the longest sentence given the serious nature of the offences, Pratt’s leadership role, and the length of the conspiracy.

Pratt has received the longest sentence so far of all the conspirators. Ruben Andre Garcia was sentenced to 20 years in prison on June 14, 2021. Theodore Gyi was sentenced to four years in prison on November 9, 2022. Matthew Wolfe was sentenced to 14 years in prison on March 20, 2024. Valorie Moser, the office manager, is set for sentencing on September 12, 2025.

One of the women said, “Today is the day we all get to reclaim our lives. As I stand here, I feel something I haven’t felt in years: Empowerment. After today, I choose healing. I choose to reclaim the dreams I once had.”

Another testified: “For years I carried shame that never belonged to me…Today, I will walk out of this courtroom an empowered woman. You will walk out in shackles.”

DEA Surge Targets Sinaloa Cartel Networks Worldwide

0

Today, the Drug Enforcement Administration announced the results of a week-long operational surge aimed at dismantling the Sinaloa Cartel, one of the world’s most violent and powerful drug cartels, responsible for flooding the United States with fentanyl, methamphetamine, cocaine, and heroin.

In February, the Trump Administration designated the Sinaloa Cartel, along with seven other groups, as a Foreign Terrorist Organization. The Sinaloa Cartel remains one of the most significant threats to public safety, public health and our national security.

DEA is committed to breaking their command, control, and distribution networks.

From August 25 through August 29, 2025, DEA agents across 23 domestic field divisions and seven foreign regions carried out coordinated enforcement actions that resulted in:

  • Arrests: 617
  • Drug Seizures:
    • 480 kilograms of fentanyl powder,
    • 714,707 counterfeit pills,
    • 2,209 kilograms of methamphetamine,
    • 7,469 kilograms of cocaine, and
    • 55 kilograms of heroin
  • Currency Seizures: $11,111,483
  • Assets seized: $1,697,313
  • Firearms: 420

“These results demonstrate the full weight of DEA’s commitment to protecting the American people,” said DEA Administrator Terrance Cole. “Every kilogram of poison seized, every dollar stripped from the cartels, and every arrest we make represents lives saved and communities defended. DEA will not relent until the Sinaloa Cartel is dismantled from top to bottom.”

There are tens of thousands of Sinaloa members, associates, and facilitators operating worldwide, in at least 40 countries who are responsible for the production, manufacturing, distribution, and operations related to trafficking dangerous and deadly synthetic drugs.

This coordinated action was a combination of DEA’s increased focus on enforcement, intelligence, and domestic and international collaboration, utilizing every resource in DEA’s arsenal to degrade the Sinaloa Cartel’s command and control.

This surge reflects DEA’s unwavering commitment to confronting the fentanyl crisis and dismantling the cartels responsible for it. DEA continues to take decisive actions to protect American families and communities.

As part of a larger whole-of-government approach to dismantling the Sinaloa Cartel and protecting U.S. communities, DEA is committed to working with the Homeland Security Task Force (HSTF) and other federal partners to ensure current and future operations advance broader U.S. efforts to combat designated terrorist organizations and transnational organized crime.

Youth Charter Issues Global Call to Action at Africa-CARICOM Summit

0

In a significant development at the second Africa-CARICOM Summit, the Youth Charter has issued a Global Call to Action, urging leaders to fully integrate young people into the dialogue on reparatory justice and transcontinental partnership.

The summit, held under the theme ‘Transcontinental Partnership in Pursuit of Reparatory Justice for Africans and People of African Descent through Reparations’, provides a crucial platform for addressing historical and systemic injustices.

Building on three decades of work in leveraging sport, arts, culture, and digital engagement, the Youth Charter’s call aligns with the summit’s focus on political, economic, and cultural collaboration.

It implores governments and institutions across both continents and the wider diaspora to invest in youth through education and skills, champion reparatory justice by supporting restorative programs, and establish “Community Campuses” that use creative and digital tools to foster opportunity.

Additionally, the call underscored the importance of strengthening connections between African and Caribbean youth and ensuring all their efforts contribute to the United Nations 2030 Sustainable Development Goals (SDGs) and Africa’s Agenda 2063.

As Youth Charter Founder and Chair, Prof. Geoff Thompson, said, the summit is not just a political milestone but a “call to action for young people of Africa and the diaspora to inherit, shape, and lead the future”.

As a lasting legacy of the summit, the Youth Charter will work with the African Union and CARICOM to advance its Community Campus Model, ensuring the voices and creativity of young people are central to achieving true reparatory justice and sustainable development.

2025 IBM Report: What You Should Know about True Cost of Data Breaches

0

The Cost of Data Breach Report 2025 by IBM revealed some crucial insights that organisations cannot afford to ignore. According to the report, the average cost of a data breach worldwide decreased by 9% to $4.44 million.

However, the United States saw a 9% increase in breach costs, reaching $9.10-$9.22 million.

The recent study revealed some crucial insights into the cost of data breaches. On average, a data breach costs around $4.44 million globally, although the United States faces significantly higher expenses. Identifying and containing a breach takes approximately 241 days, with most of the time spent on detection.

The study also highlighted the growing concern of artificial intelligence in data breaches, with 13% of organisations experiencing AI-related breaches due to the rapid adoption of AI outpacing its security and governance.

Furthermore, the issue of ‘Shadow AI’ was prominent, with 20% of organisations having unauthorised AI implementations that contribute to breach costs.

These findings underlie the need for organisations to prioritise robust security measures and effective governance to mitigate the risks associated with data breaches and AI adoption.

Data breaches can occur due to various factors, and understanding these causes is crucial for organisations to protect themselves. One major cause is insider threats, where individuals with authorised access to an organisation’s systems intentionally or unintentionally compromise data security.

These threats can be particularly damaging because insiders often have intimate knowledge of the organisation’s systems and can exploit this knowledge to inflict maximum damage.

Another significant contributor to breach costs is third-party risk, which arises when external parties, such as vendors or partners, have access to an organisation’s systems or data. If these third parties have inadequate security measures in place, they can become a vulnerability that hackers can exploit.

Phishing attacks are also a common cause of data breaches, accounting for 16% of breaches. Phishing involves tricking individuals into revealing sensitive information, such as login credentials or financial information, often through emails or messages that appear to be from a trusted source.

To prevent data breaches, organisations must implement robust security measures, including employee training, to identify and mitigate these risks.

Common causes of data breaches
Insider Threats: Insider threats involve employees or partners misusing their access to an organisation’s systems to steal or manipulate data. These threats can be intentional or accidental and pose a significant risk to data security.

Third-Party Risk: Third-party situations and supply chain compromises can also contribute to breach costs. Organisations must carefully vet their third-party vendors and partners to ensure they have adequate security measures in place.

Phishing Attacks: Phishing is a type of social engineering attack that involves tricking individuals into revealing sensitive information. Organisations can reduce the risk of phishing attacks by educating employees on how to recognise malicious emails and implementing robust security measures.

Recommendations
To prevent data breaches and protect sensitive information, organisations should consider implementing several key strategies. One crucial step is to strengthen identity and access management capabilities, which involves ensuring that only authorised individuals have access to sensitive data and systems.

This can be achieved through secrets management, which securely stores and manages sensitive information such as passwords and API keys, and passwordless authentication, which eliminates the need for passwords and reduces the risk of password-related breaches.

Another important consideration is AI governance, as the adoption of artificial intelligence continues to grow. Organisations need to prioritise AI security and governance to mitigate the risks associated with AI, including the potential for AI-related breaches and the misuse of AI technology.

Finally, data protection is essential in preventing breaches, and organisations should focus on discovering and securing sensitive data, as well as monitoring its use. When taking a proactive approach to data protection, organisations can reduce the risk of breaches and protect their sensitive information from unauthorised access or theft.

India-specific findings
In India, the cost of data breaches has reached alarming levels, with the average cost of a breach hitting a record high of INR 220 million, representing a 13% increase from 2024. This significant rise underscores the growing threat of cyberattacks in the country.

Phishing emerged as the leading cause of data breaches in India, responsible for 18% of all breaches. This type of cyberattack involves tricking individuals into divulging sensitive information, such as login credentials or financial data, often through deceptive emails or messages. Furthermore, the use of unauthorised AI, known as Shadow AI, has become a substantial concern, adding INR 17.9 million to the cost of breaches in India.

This highlights the urgent need for better AI governance and oversight to mitigate the risks associated with AI adoption. Addressing these challenges and implementing robust security measures, Indian organisations can reduce the risk of data breaches and protect their sensitive information from cyber threats.

The 2025 Cost of Data Breach Report by IBM states the critical need for organisations to prioritise cybersecurity and invest in effective measures to prevent data breaches. When organisations strengthen their security protocols, they can significantly reduce the risk of breaches and minimise the associated costs.

This involves implementing robust security controls, enhancing employee training, and staying up-to-date with the latest security technologies.

Taking a proactive approach to cybersecurity, organisations can protect their sensitive data, maintain customer trust, and avoid the financial and reputational damage that can result from a data breach. Ultimately, investing in cybersecurity is essential for organisations to safeguard their assets and ensure long-term success.

 

Funminiyi B. Philips is a cybersecurity enthusiast. He can be reached on LinkedIn 

Trump Restores United States Department of War

0

Fact Sheet: President Donald J. Trump Restores the United States Department of War

The White House
Fact Sheets
September 5, 2025

RESTORING THE DEPARTMENT OF WAR: Today, President Donald J. Trump signed an Executive Order to restore the historic name “Department of War” as a secondary title for the Department of Defense. This is the 200th Executive Order the President has signed since taking office.

  • The Order authorizes the Secretary of Defense, the Department of Defense, and subordinate officials to use secondary titles such as “Secretary of War,” “Department of War,” and “Deputy Secretary of War” in official correspondence, public communications, ceremonial contexts, and non-statutory documents within the executive branch.
  • The Order directs all executive departments and agencies to recognize and accommodate these secondary titles in internal and external communications.
  • The Order instructs the Secretary of War to recommend actions, to include legislative and executive actions, required to permanently rename the U.S. Department of Defense to the U.S. Department of War.

PROJECTING STRENGTH AND RESOLVE: The United States military is the strongest and most lethal fighting force in the world, and the President believes this Department should have a name that reflects its unmatched power and readiness to protect national interests.

  • The Department of War, established in 1789, led the U.S. to victory in the War of 1812, World War I, and World War II, inspiring confidence in America’s military strength.
  • On January 8, 1790, President George Washington, in his First Annual Address to Congress, stated “To be prepared for war is one of the most effective means of preserving peace”.  Our founders knew that projecting strength would be the best way to ensure that we would rarely need to use it.
  • The name “Department of War” conveys a stronger message of readiness and resolve compared to “Department of Defense,” which emphasizes only defensive capabilities.
  • Restoring the name “Department of War” will sharpen the focus of this Department on our national interest and signal to adversaries America’s readiness to wage war to secure its interests.

ADVANCING PEACE THROUGH STRENGTH: The American people elected President Trump to restore an America First approach, prioritizing peace through strength and ensuring the world respects the United States again.

  • In his first week in office, President Trump signed an Executive Order to prioritize readiness and lethality in our armed forces.
  • President Trump has emphasized restoring national pride in America’s military heritage, including honoring historic victories as the Nation approaches its 250th birthday.
  • To honor the Army’s 250th birthday, President Trump held a military parade in Washington, D.C., showcasing America’s military might and celebrating its storied legacy of valor and victory.
  • Under President Trump’s leadership, the U.S. military delivered a decisive and obliterating strike against Iran’s nuclear capabilities, demonstrating America’s unmatched military power and deterring further aggression.
  • Recruiting is now at its highest in decades, revitalizing the armed forces with a new generation of warriors committed to defending America’s interests.

Cybersecurity, Remote Work Revolution and Securing the Workplace

0

The shift to remote work has brought numerous benefits, including increased flexibility and productivity. However, it has also introduced a plethora of cybersecurity challenges that organisations must navigate to protect sensitive data and maintain uninterrupted workflows.

Faruq Aremu, a cybersecurity expert specialising in Security Operations Centre (SOC) and digital forensics, and Technical Lead at Knight Dojo, said, “The remote work era demands a new approach to cybersecurity, one that prioritises flexibility, scalability, and continuous monitoring.”

Remote work environments face a range of cyber threats that can compromise company data and systems. Phishing and social engineering attacks are major concerns, where remote workers are targeted with fake emails or tactics that trick them into revealing sensitive information or allowing unauthorised access to company systems.

Home networks used for remote work often lack strong security, making them vulnerable to hacking and data theft.

Using personal devices for work without proper antivirus software or encryption can also lead to data breaches. Furthermore, employees may use unapproved apps or cloud services, known as shadow IT, which can bypass security protocols and put company data at risk.

Remote work also increases the risk of data loss due to inadequate protection policies, which can result in sensitive information being lost or stolen. To address these risks, organisations must implement robust cybersecurity measures to safeguard their remote work environments and ensure the security of their data and systems.

To mitigate the risks associated with remote work, organisations should adopt a comprehensive approach to cybersecurity. This involves implementing several key practices. First, a zero-trust framework verifies user identities and device security before granting access to company systems and data, ensuring only authorised personnel can access sensitive information.

Multi-factor authentication adds an extra layer of protection beyond passwords, making it harder for unauthorised individuals to gain access. Organisations should also use user behaviour analytics tools to monitor user activity and detect potential security threats in real-time.

Proper cloud configurations and access are crucial to prevent gaps in cloud infrastructure that attackers can exploit. Regular security audits help identify vulnerabilities before they become major incidents. Educating employees on cybersecurity best practices is also vital, as informed employees can recognise phishing emails, use strong passwords, and follow security protocols.

Using Virtual Private Networks (VPNs) encrypts internet traffic and masks IP addresses, adding protection for sensitive data. Finally, strong password policies, including unique and complex passwords with two-factor authentication, significantly enhance an organisation’s security posture. By implementing these practices, organisations can effectively protect their remote work environments.

The world of remote work and cybersecurity is constantly changing. Some important statistics and trends are emerging. A significant number of IT leaders, approximately 74%, believe AI-powered attacks pose a major threat to their organisation’s security. This shows growing concern about advanced cyber threats. In remote work, there’s a clear shift towards flexible arrangements.

About 52% of US employees work in hybrid environments, and 27% work fully remotely. Remote work has also become crucial for job satisfaction. Around 64% of remote workers would likely quit if their flexible work options were taken away. This highlights the importance of flexible work in keeping employees happy.

These trends indicate that organisations must prioritise cybersecurity and adapt to the evolving work landscape to safeguard their assets and meet the needs of their employees.

Remote work presents its own set of cybersecurity challenges, demanding a proactive and flexible approach to stay ahead of emerging threats. By implementing essential best practices, such as zero-trust frameworks, multi-factor authentication, and regular employee training, organisations can significantly reduce the risk of cyber-attacks and safeguard sensitive data.

Effective cybersecurity is not a one-time task but an ongoing process.

“Cyber security is a continuous process that requires ongoing monitoring, evaluation, and improvement,” said Aremu.

Therefore, organisations must prioritise cybersecurity, stay up-to-date with the latest threats and trends, and continually assess and enhance their security measures to ensure the integrity and security of their remote work environments.

Funminiyi B. Philips is a cybersecurity enthusiast. He can be reached on LinkedIn

UN Seeks Justice ‘Real Change’ for People of African Descent

0

On the International Day for People of African Descent, celebrated each year on August 31, UN Secretary-General António Guterres has called for justice, dignity and equality for people of African descent around the world

In a message released ahead of the day, Guterres honoured the “extraordinary” contributions of people of African descent across every sphere of human endeavour.

The UN secretary-general also recognised the “long shadows” of slavery and colonialism, which include systemic racism, unequal economies and societies, and the digital divide (between those who are able to benefit from digital technology and those who don’t have access).

Mr. Guterres hailed the Global Digital Compact – adopted in 2024 as part of the Pact for the Future – as a step forward, citing commitments to tackle discrimination and hate speech in digital technologies. “White supremacy and dehumanising narratives,” wrote the UN chief, “are amplified by social media, and, too often, racial bias is encoded in algorithms.”

“Eighty years after the United Nations Charter reaffirmed the equal rights and inherent dignity of every human being, and sixty years since the adoption of the International Convention on the Elimination of All Forms of Racial Discrimination,” he stated. “It is long past time to right historic wrongs.”

This year’s International Day is the first to take place during the second International Decade for People of African Descent, which runs from January 1, 2025, to December 31, 2034.

The decade, which is centred on the theme ‘People of African Descent: Recognition, Justice, and Development’, aims to underscore the importance of acknowledging the rights and contributions of people of African descent.

Guterres has called for the next ten years to drive “real change,” including working towards a United Nations Declaration on the full respect of the human rights of people of African descent.

The first decade saw more than 30 countries change their laws and policies to tackle racial discrimination and address specific issues faced by people of African descent – in some cases for the first time.

The Permanent Forum on People of African Descent was created, and new International Days were launched to celebrate the contributions of the diaspora, including those of women and girls.

Building on the progress made between 2015 and 2024, the second Decade seeks to amplify global efforts toward justice and development for individuals of African descent and create a more equitable future, in which the aspirations and rights of people of African descent are fully recognised, honoured, and celebrated.

Gauteng Provincial Legislature Demands Roadblocks That Fight Crime Not Just Revenue Collection

0

The Gauteng Provincial Legislature’s Portfolio Committee on Community Safety has raised concerns over the current approach to roadblocks conducted across the province by Metro Police Departments and the Gauteng Traffic Police.

During a meeting held yesterday, where Premier Panyaza Lesufi and Provincial Police Commissioner Lieutenant-General Tommy Mthombeni appeared before the committee, members questioned the widespread practice of roadblocks that appear to focus primarily on checking and printing outstanding traffic fines and forcing motorists to pay fines, particularly those with enforcement orders.

The committee expressed concern that these operations are increasingly being used as a revenue collection exercise and a substitute for the Post Office in distributing traffic fines, especially following its closure in many areas.

Instead of targeting criminals, illegal firearms, drugs, and unroadworthy vehicles, some of these roadblocks merely hand motorists notices of unpaid fines, often creating severe traffic congestion and frustration without meaningfully contributing to the fight against crime.

The committee is of the view that Gauteng residents want to see roadblocks that make them safer, not roadblocks that feel like mobile Post Offices. Every roadblock should be a crime-fighting tool—arresting wanted suspects and illegal foreign nationals, recovering dangerous weapons, and ensuring general compliance with the law.

The committee reaffirmed its support for roadblocks as a vital tool in crime prevention, but insists that they must be impactful, intelligence-driven, and focused on crime.

Members further called on motorists to play their part by respecting the rules of the road and settling outstanding fines on time, thereby freeing law enforcement officers to focus on combating core criminality.

Bor Residents Seek Ownership of Peace Process, Cooperation with Political Leaders

0

“To achieve lasting peace, we must build trust and bridge the gap between leaders and their communities. By actively listening to one another, we can unite and move forward as a nation,” said Rodah Nyankiir Makuei at a ‘Citizens’ Talks’ forum in Bor.

Achieving a greater sense of ownership among South Sudanese citizens of their country’s peace agreement and its implementation was at the forefront when some 60 people from all walks of life came together to discuss how it can be achieved.

Talks covered several aspects of the peace deal, including the drafting of a new constitution and electoral reforms, as well as security sector arrangements and political power-sharing, and, not least, how to ensure that ordinary people have a say in the process.

Dialogue, several attendees pointed out, is key to peace, reconciliation, and genuine political participation. One of these voices belonged to John Mayol Nhial.

“When people communicate, they cultivate a listening heart and create space for the mutual forgiveness we need to unite,” he said, with Simon Manyok, both a representative of the Jonglei State government and a Human Rights Advisor, making a similar point about a shared responsibility.

“Political parties may have signed our peace agreement, but it will only succeed when citizens are actively involved in implementing it,” he affirmed.

The forum, organised by the United Nations Mission in South Sudan, resulted in a commitment to establish a statewide early-warning system to be coordinated by civil society and the Ministry of Local Government, as well as a recommendation to hold a conference for all relevant stakeholders in Jonglei.

“We hope that initiatives like this forum and other inclusive platforms will promote mutual trust, come up with practical solutions, and improve accountability,” commented Samuel Sarpong, a Civil Affairs Officer serving with the peacekeeping mission.

CAR’s Ratification of Maputo Protocol: Sustained Efforts to Guarantee Women’s, Girls’ Rights Needed

0

Reacting to the ratification of the Protocol to the African Charter on Human and Peoples’ Rights on the Rights of Women in Africa on 26 August by the Central African authorities, Abdoulaye Diarra, Senior Researcher at Amnesty International, said the Central African authorities’ ratification of the Maputo Protocol is a welcome and long-awaited step in promoting and protecting women and girls’ rights in the country, including from all forms of gender-based violence such as early and forced marriage and female genital mutilation that have long hindered their education, health, and well-being.

“However, actions speak louder than words and Central African authorities must now follow through to take necessary measures to ensure the full implementation of the Maputo Protocol by adopting a comprehensive law to address GBV and promote gender equality, strengthening the justice system, improving support services for survivors, and raising awareness in communities, including in rural areas,” said Diarra.

According to the UNFPA’s latest figures, 61% of Central African girls are still married before the age of 18, and 22% of girls and women aged 15 – 49 suffer from a form of genital mutilation.

Diarra added, “We urge the adoption of a holistic approach that addresses the root causes of gender-based violence to change attitudes and norms in order to empower women and girls in the Central African Republic.

“We also urge Niger and Chad, the two countries in West and Central Africa, who have not yet ratified the Maputo Protocol, to do so without delay.”

The Maputo Protocol is an international human rights instrument established by the African Union, which came into effect in 2005.

As of August 28, 2025, out of the 55 member countries in the African Union, 46 have ratified the Maputo Protocol.

The AU states that have neither signed nor ratified the Protocol yet are Egypt and Morocco. The states that have signed but not yet ratified are Burundi, Chad, Eritrea, Madagascar, Niger, Somalia, and Sudan.