Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using Wi-Fi to connect to the Internet in public places will be required to register their mobile devices with the Kenya Network Information Centre (Kenic), under new rules aimed at fighting cybercrime.

The customers will be required to provide their telephone numbers and identity card details, which can be used to track them down should they use their gadgets to commit cybercrimes such as fraud or hacking websites.

The gadgets that must be registered include laptops, mobile phones, iPads, e-readers and any other devices that can be used at a public Wi-Fi hot spots such as hotels and restaurants.

This implies that in addition to registering the SIM cards in the gadgets with either Safaricom, Airtel or Telkom Kenya, people who use Wi-Fi will be required to register their devices at the point where they access the Internet, be it in hotels, restaurants, offices and public transport vehicles.

The director-general of the Communications Authority of Kenya, Mr Francis Wangusi, gave the new directive after taking over as the new chairman of the Association of Regulators of Information and Communications for Eastern and Southern Africa (Aricea), the organisation mandated to fight cybercrime with the Comesa region.
“We will license Kenic to register device owners using their national identity cards and telephone numbers, the identity of a device will be known when it connects to Wi-Fi,” Mr Wangusi said at the annual general meeting held in Nairobi.

Failure by any establishment to adhere to the rules will compel Kenic to withdraw the Wi-Fi services used by the defaulting institutions.
“In case a crime is committed, we will then be able to trace people using national identity cards that were registered and their phone numbers keyed in during registration,” said Mr Wangusi.
The Communications Authority is also setting up a forensic laboratory to detect and neutralise impending cyberattacks.
Mr Wangusi said the authority will conduct a detailed study on the extent of web hackings in Kenya. According to him, cyberattacks were on the rise, with the banking sector being the biggest victim followed by government institutions.

The new rules will also require all Kenyan companies to host their websites in the country rather than outside. This would help avoid extra costs associated with sending data out to a different location and back again to the website owner.
Dr Abu Dafalla, the Comesa Director for Infrastructure, said that Kenya now leads in pushing the cybercrime agenda within the region.
“Criminals are carrying out illegal activities on the web and we must protect the region even us we focus on trade. A secure cyberspace will retain revenue loss. Credit card fraud alone is estimated at $37 billion annually in the region,” he said.
Last year, Kenya faced several cyber-threats when the Kenya Defence Forces social media account was hacked. The hacker, self-identified by the Twitter handle @Anon_0x03, also breached the National Environment Trust Fund’s website.

By registering devices used by every Kenyan, there is a possibility that such anonymous attackers can be located from wherever they operate within the country.
Mr Hillary Siele, the manager at Nanchang Hotel in Westlands, Nairobi, welcomed the move, saying it would help curb fraud targeting hotels, leading to loss of money and important documents.

Nation
 

« Some Notes About Wassenaar
Is The Tech Investment Bubble About To Burst ? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

B2Bcert

B2Bcert

B2BCERT one of the top companies offering ISO 9001, ISO 14001, ISO 45001, ISO 22000, ISO 27001, ISO 20000,CE Marking, HACCP, and other globally accepted standards and Management solutions.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.