Evans,<div><br></div><div>Proprietary systems can claim R&D investment on things like these. My point is not on efficacy of platforms but the cost passed on to customers. Proprietary system vendors will use their claims to justify high prices and that's why I don't thing its surprising a price tag of 8.5b has been slapped on this project. Regardless of whether it runs on Windows or Linux, would you expect a western vendor selling 'military grade' surveillance infrastructure to provide it at what we would collectively describe as an affordable price?</div>
<div><br></div><div><br></div><div class="gmail_extra"><br clear="all"><div><div link="blue" vlink="purple" lang="EN-GB"><div><div><font face="Arial"><span style="font-size:10pt">Kind regards,<br><br></span></font></div><div>
<div><div><font color="#333333" face="Arial"><span style="font-size:10pt">Muchiri Nyaggah |�</span><font size="1">LEAD FELLOW, CODE4KENYA</font></font></div><div><span style="font-family:Arial"><font color="#333333" size="1">@muchiri</font></span></div>
<div><font color="#333333" face="Arial" size="1">Cell: +254 722 506400</font></div><div><span style="color:rgb(51,51,51);font-family:Arial;font-size:x-small">Skype: mrmuchiri</span></div></div><div><div><span style="color:rgb(51,51,51);font-family:Arial;font-size:x-small"><a href="http://WWW.CODE4KENYA.ORG" target="_blank">WWW.CODE4KENYA.ORG</a></span></div>
</div><div><span style="color:rgb(51,51,51);font-family:Arial;font-size:x-small"><br></span></div><div><span style="color:rgb(51,51,51);font-family:Arial;font-size:x-small"><br></span></div><div><font color="#666666" face="Arial"><br>
</font></div></div></div></div></div><br>
<br><br><div class="gmail_quote">On Fri, Nov 30, 2012 at 6:33 AM, Matunda Nyanchama <span dir="ltr"><<a href="mailto:mnyanchama@aganoconsulting.com" target="_blank">mnyanchama@aganoconsulting.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div style="font-size:12pt;font-family:arial,helvetica,sans-serif"><div style="font-family:arial,helvetica,sans-serif;font-size:12pt">
<span>Friends</span></div><div style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Times New Roman'"><span><br></span></div><div style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Times New Roman'">
National Task Force on Police Reforms (created following the post-election violence of 2008) was presented with various views and made certain recommendations. I have included below some views and recommendations pertaining to technology.</div>
<div style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Times New Roman'"><br></div><div style="background-color:transparent">May be the Kenyan Police have
 a roadmap towards effective use of ICTs. For example what would be priority: automating the�occurrence�book (and use of intelligent data mining to design effective/efficient solutions), HR, Finance, etc or CCTV?�</div><div style="background-color:transparent">
<br></div><div style="background-color:transparent">On our part, we did prepare an unsolicited proposal in which we suggested a�diligent�approach to�technology�needs for�policing, which would result in prioritization. We later learnt that the priority they had was acquiring CCTV, an idea we felt was being pushed by CCTV vendors rather than security priorities.</div>
<div style="background-color:transparent"><br></div><div style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Times New Roman'">NB: Kshs 8.5 billion? I hope someone has a good rationale.�</div>
<div style="background-color:transparent"><br></div><div style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Times New Roman'">Here are the police views according to the report</div><div style="background-color:transparent">
<div class="MsoNormal" style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;margin-left:18.0pt;text-align:justify;line-height:130%"><i><span lang="EN-US" style="line-height:130%;font-family:Verdana,sans-serif">a)<span style="font-style:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">�� </span></span></i><i><span lang="EN-US" style="line-height:130%;font-family:Verdana,sans-serif">Communication
equipment within the police, particularly in rural areas, were found to be
either absent, non-functional, or poor and outdated. This directly undermines
the ability by members to access <b>telephones,
mobile phones or internet facilities</b> to enable them to undertake their
normal policing functions. Police investigators routinely use their personal
mobile phones for official purposes, as they have no access to police
communication systems. The Task Force was also informed that some criminals
have superior communication equipment to that of the police, which enables them
to intercept police communications. <u></u><u></u></span></i></div>

<div style="background-color:transparent"><i style="line-height:130%;text-align:justify;background-color:transparent"><span lang="EN-US" style="line-height:130%;font-family:Verdana,sans-serif">b)<span style="font-style:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">�� </span></span></i><i style="line-height:130%;text-align:justify;background-color:transparent"><span lang="EN-US" style="line-height:130%;font-family:Verdana,sans-serif">The
investigative function of the police has been weakened by inadequate crime
intelligence, <b>lack of modern technology</b>,
reduced operational autonomy of the CID, transfer practices, and a re-active �fire
fighting� approach to policing.</span></i><span style="background-color:transparent">�</span><br></div><div style="font-style:normal;font-size:16px;font-family:'Times New Roman'"><br></div></div><div style="font-family:arial,helvetica,sans-serif;font-size:12pt">
</div><div style="font-size:12pt;font-family:arial,helvetica,sans-serif">�<span style="font-family:Verdana,sans-serif;line-height:130%;text-align:justify">The Task Force noted that:</span></div>

<div class="MsoNormal" style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;margin-left:18.0pt;text-align:justify;line-height:130%"><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">a)<span style="font-style:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">�� </span></span></i><b><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">Information
and Communication Technology (ICT): </span></i></b><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">The police services lack the basic ICT
knowledge and skills, equipment and infrastructure. The lack of an effective
electronic network and communication system, which connects police stations,
undermines the ability of the police to use simple and cheap communication
systems for policing purposes. The police are further not able to key in and
preserve crucial information and data that would ordinarily help them not only
track criminals but also to inform them on crime patterns or trends as well as
assisting in case management.� <a name="13b4f671b5d3e879__Toc243915479"></a><a name="13b4f671b5d3e879__Toc243914087"></a><a name="13b4f671b5d3e879__Toc243752869"></a><a name="13b4f671b5d3e879__Toc243752219"></a><a name="13b4f671b5d3e879__Toc243612624"></a><a name="13b4f671b5d3e879__Toc243612151"><u></u><u></u></a></span></i></div>


<div class="MsoNormal" style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;margin-left:18.0pt;text-align:justify;line-height:130%"><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">b)<span style="font-style:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">��
</span></span></i><b><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">Cyber crime</span></i></b><b><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">:
</span></i></b><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">This
Task Force noted the increase in the use of information technology in the
commission of crimes including complex frauds, computer hacking, credit cards
scams, spreading of computer viruses, facilitation of human trafficking and
child pornography using internet. It was clear that most police officers lack
the most basic I.C.T. knowledge.�<u></u><u></u></span></i></div><div style="font-family:arial,helvetica,sans-serif;font-size:12pt"><div style="margin-bottom:6.0pt;line-height:130%"><span style="font-size:11.0pt;line-height:130%">The Task
Force recommended, <i>inter alia</i>,<u></u><u></u></span></div>

<div style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;margin-left:17.0pt;text-align:justify;line-height:130%"><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">(a)</span></i><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">That the tooling,
logistical and technological capacity of the police services be reviewed to
establish the exact needs and specification in order to bring policing to
international standards. Consideration should be given to prioritizing
Communication and information technology and transportation.<u></u><u></u></span></i></div>

<div style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;margin-left:17.0pt;text-align:justify;line-height:130%"><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">(b)</span></i><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">That the use of
CCTV cameras as a policing component particularly in major cities and our
highways be incorporated in the National Policing Plan. The police should
coordinate with the private sector to maximize and synchronize the use of CCTV
to combat crime.<u></u><u></u></span></i></div>

<div style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;margin-left:17.0pt;text-align:justify;line-height:130%"><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">(c)<span style="font-style:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'"> </span></span></i><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">�Legislation needs to be developed to make
electronic, audio-visual, computer data and photographic evidence to be
admissible in court.� <u></u><u></u></span></i></div>

<div style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;margin-left:17.0pt;text-align:justify;line-height:130%"><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">(d)</span></i><i><span lang="EN-US" style="line-height:130%;font-family:"Verdana","sans-serif"">That the capacity
of Forensic Science Service Department (FSSD) be enhanced within the
Directorate of Criminal Investigations to be staffed by civilian experts to
enable the police concentrate on their core duties.<u></u><u></u></span></i></div></div><div style="font-family:arial,helvetica,sans-serif;font-size:12pt"><font><span style="font-family:times,serif">----------------------------------------------------------------------------------------------</span><br style="font-family:times,serif">
</font><font><span style="font-family:times,serif">Matunda Nyanchama, PhD, CISSP; <a href="mailto:mnyanchama@aganoconsulting.com" target="_blank">mnyanchama@aganoconsulting.com</a></span><br style="font-family:times,serif">
<span style="font-family:times,serif">Agano Consulting Inc.;� </span><a rel="nofollow" style="font-family:times,serif" href="http://www.aganoconsulting.com/" target="_blank">www.aganoconsulting.com</a>; </font><font>Twitter:�<a rel="nofollow" href="http://twitter.com/#%21/nmatunda" target="_blank"><span style="color:rgb(54,99,136)">nmatunda;�
 </span></a></font><font><span style="text-decoration:underline"></span>Skype: okiambe</font><font><span style="text-indent:0px;letter-spacing:normal;font-variant:normal;font-style:normal;font-weight:normal;line-height:normal;border-collapse:separate;text-transform:none;font-size:medium;white-space:normal;font-family:'Book Antiqua';word-spacing:0px"><span style="font-size:11px;font-family:verdana,helvetica,sans-serif"></span></span><br style="font-family:times,serif">
<span style="font-family:times,serif">----------------------------------------------------------------------------------------------</span><span style="font-style:italic;font-family:times,serif"></span><span style="font-family:times,serif" lang="EN-CA"></span></font></div>
<div style="font-family:arial,helvetica,sans-serif;font-size:12pt"><span style="font-family:times,serif"><span style="font-size:10pt">Be prepared for ICT security failures & know how to respond when they happen! <br>Call: <span style="font-weight:bold"><a href="tel:%2B1-888-587-1150" value="+18885871150" target="_blank">+1-888-587-1150</a> </span>or <a rel="nofollow"><span style="font-weight:bold">info@aganoconsulting.com</span></a><br>
<span style="font-style:italic">�</span></span></span><span style="font-family:times,serif">----------------------------------------------------------------------------------------------</span><span style="font-style:italic;font-family:times,serif"></span><span style="font-family:times,serif" lang="EN-CA"></span></div>
<div style="font-family:arial,helvetica,sans-serif;font-size:12pt"><span style="font-family:times,serif;font-size:13px"><div>"The best revenge is massive success" - Frank Sinatra<span style="font-style:italic"></span></div>
</span><span style="font-family:times,serif">-----------------------------------------------------------------------------------------------</span><br style="font-family:times,serif"><font style="font-family:times,serif" size="1">This e-mail, including attachments, may be privileged and may contain confidential or proprietary
 information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.</font><br>
</div></div></div><br>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/muchiri%40semacraft.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/muchiri%40semacraft.com</a><br>

<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>

<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div><br></div>