Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using Wi-Fi to connect to the Internet in public places will be required to register their mobile devices with the Kenya Network Information Centre (Kenic), under new rules aimed at fighting cybercrime.

The customers will be required to provide their telephone numbers and identity card details, which can be used to track them down should they use their gadgets to commit cybercrimes such as fraud or hacking websites.

The gadgets that must be registered include laptops, mobile phones, iPads, e-readers and any other devices that can be used at a public Wi-Fi hot spots such as hotels and restaurants.

This implies that in addition to registering the SIM cards in the gadgets with either Safaricom, Airtel or Telkom Kenya, people who use Wi-Fi will be required to register their devices at the point where they access the Internet, be it in hotels, restaurants, offices and public transport vehicles.

The director-general of the Communications Authority of Kenya, Mr Francis Wangusi, gave the new directive after taking over as the new chairman of the Association of Regulators of Information and Communications for Eastern and Southern Africa (Aricea), the organisation mandated to fight cybercrime with the Comesa region.
“We will license Kenic to register device owners using their national identity cards and telephone numbers, the identity of a device will be known when it connects to Wi-Fi,” Mr Wangusi said at the annual general meeting held in Nairobi.

Failure by any establishment to adhere to the rules will compel Kenic to withdraw the Wi-Fi services used by the defaulting institutions.
“In case a crime is committed, we will then be able to trace people using national identity cards that were registered and their phone numbers keyed in during registration,” said Mr Wangusi.
The Communications Authority is also setting up a forensic laboratory to detect and neutralise impending cyberattacks.
Mr Wangusi said the authority will conduct a detailed study on the extent of web hackings in Kenya. According to him, cyberattacks were on the rise, with the banking sector being the biggest victim followed by government institutions.

The new rules will also require all Kenyan companies to host their websites in the country rather than outside. This would help avoid extra costs associated with sending data out to a different location and back again to the website owner.
Dr Abu Dafalla, the Comesa Director for Infrastructure, said that Kenya now leads in pushing the cybercrime agenda within the region.
“Criminals are carrying out illegal activities on the web and we must protect the region even us we focus on trade. A secure cyberspace will retain revenue loss. Credit card fraud alone is estimated at $37 billion annually in the region,” he said.
Last year, Kenya faced several cyber-threats when the Kenya Defence Forces social media account was hacked. The hacker, self-identified by the Twitter handle @Anon_0x03, also breached the National Environment Trust Fund’s website.

By registering devices used by every Kenyan, there is a possibility that such anonymous attackers can be located from wherever they operate within the country.
Mr Hillary Siele, the manager at Nanchang Hotel in Westlands, Nairobi, welcomed the move, saying it would help curb fraud targeting hotels, leading to loss of money and important documents.

Nation
 

« Some Notes About Wassenaar
Is The Tech Investment Bubble About To Burst ? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

SignalRed

SignalRed

SignalRed provides the cutting edge next-generation penetration testing and secure development solutions to startups and large enterprises.

Soteria Cybersecurity

Soteria Cybersecurity

Soteria is your trusted Cybersecurity Partner in IT and OT.

PMSLTech

PMSLTech

Discover emerging trends and digital innovations to launch, grow, and scale your venture successfully.