<html><body><div style="color:#000; background-color:#fff; font-family:garamond, new york, times, serif;font-size:16px"><div id="yui_3_16_0_1_1435762590678_26639">Warm Greetings!</div><div id="yui_3_16_0_1_1435762590678_27182"><br></div><div id="yui_3_16_0_1_1435762590678_27130">Quite an uphill and it is good to interrogate from the perspective of what is the objective that aims to be achieved.</div><div id="yui_3_16_0_1_1435762590678_30789"><br></div><div id="yui_3_16_0_1_1435762590678_30833">Perhaps KENIC strategy includes having policing agents across the counties too.</div><div id="yui_3_16_0_1_1435762590678_31027"><br></div><div dir="ltr" id="yui_3_16_0_1_1435762590678_31136">On legislation front, an area that must still be considered is the human force security aka police who are the ones to enforce, investigate prosecute etc. <br></div><div id="yui_3_16_0_1_1435762590678_26773"><br></div><div id="yui_3_16_0_1_1435762590678_27027" dir="ltr">Would our County Governments at some point lay claim also on the digital front? </div><div id="yui_3_16_0_1_1435762590678_26824">Probably not now, as this is not an obvious money opportunity now. Data always can be transformable to be an economical cash cow - perhaps in time it will be.</div><div id="yui_3_16_0_1_1435762590678_31227"><br></div><div>Certainly for KIGF this is a suitable topical area.<br></div><div id="yui_3_16_0_1_1435762590678_26823"><br></div><div id="yui_3_16_0_1_1435762590678_26821">Blessed day.<br></div><div id="yui_3_16_0_1_1435762590678_26822"><br></div><div id="yui_3_16_0_1_1435762590678_26770">Regards/Wangari<br></div><div id="yui_3_16_0_1_1435762590678_26632"><span></span></div><div id="yui_3_16_0_1_1435762590678_26726"> </div><div id="yui_3_16_0_1_1435762590678_27211" class="signature">---<br><font id="yui_3_16_0_1_1435762590678_31178" style="font-weight:bold;font-family:verdana, helvetica, sans-serif;" size="2"><span style="color:rgb(127, 0, 63);">Pray God Bless. 2013Wangari circa - </span><span id="yui_3_16_0_1_1435762590678_31177" style="color:rgb(127, 0, 63);">"Being of the Light, We are Restored Through Faith in Mind, Body and Spirit; We Manifest The Kingdom of God on Earth".</span></font><br></div> <br><div id="yui_3_16_0_1_1435762590678_27210" class="qtdSeparateBR"><br><br></div><div style="display: block;" id="yui_3_16_0_1_1435762590678_30953" class="yahoo_quoted"> <div id="yui_3_16_0_1_1435762590678_30952" style="font-family: garamond, new york, times, serif; font-size: 16px;"> <div id="yui_3_16_0_1_1435762590678_30951" style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, Sans-Serif; font-size: 16px;"> <div dir="ltr"> <font size="2" face="Arial"> On Wednesday, 1 July 2015, 5:12, Josiah Mugambi via kictanet <kictanet@lists.kictanet.or.ke> wrote:<br> </font> </div> <br><br> <div id="yui_3_16_0_1_1435762590678_30950" class="y_msg_container"><div id="yiv0421673934"><div id="yui_3_16_0_1_1435762590678_30949"><div id="yui_3_16_0_1_1435762590678_30948" dir="ltr">I'm looking forward to a formal statement on the CA website on this matter. <div><span style="line-height:1.5;"><br clear="none"></span></div><div><span style="line-height:1.5;"><b>Cyber Security</b></span></div><div><span style="line-height:1.5;"><br clear="none"></span></div><div><span style="line-height:1.5;">I just don't see how this works out. If the aim is combating cybersecurity, any (black hat) hacker worth his/her salt will obfuscate their identity/location using any number of ways. And getting online via a public hotspot is only one of a myriad of ways.</span><br clear="none"></div><div><div><br clear="none"></div><div>What defines public wifi? How would this be enforced? Is it even possible? Any android smart phone can be turned into a (public) wifi hotspot, how would this be 'policed'. </div><div><br clear="none"></div><div>Cyber security is a big deal in this connected world, but I do not think that this is the way to combat it. </div></div><div><br clear="none"></div><div><b>Local Hosting</b></div><div id="yui_3_16_0_1_1435762590678_30955">Enforced Local hosting: This is really simple; why get involved in what is essentially a business decision? If we want local hosting done locally, we need to help the likes of Angani be competitive globally, I don't think legislation is the way there. </div><div id="yui_3_16_0_1_1435762590678_30954"><br clear="none"></div><div id="yui_3_16_0_1_1435762590678_30947">I'm really looking forward to this edition of the KIGF. Timing couldn't be better.</div><div id="yui_3_16_0_1_1435762590678_30956"><br clear="none"></div></div><br clear="none"><div class="yiv0421673934gmail_quote"><div dir="ltr">On Wed, Jul 1, 2015 at 1:32 PM Grace Githaiga via kictanet <<a rel="nofollow" shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" target="_blank" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br clear="none"></div><blockquote class="yiv0421673934gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div><div dir="ltr">Looking at the story, I wondered if the journalist had misunderstood the DG or really KENIC is going to be given the role of policing WIFIs. Is this really feasible and is it KENIC's role? It just does not sound right. <div><br clear="none"></div><div>A response from CA may set the record straight!<br clear="none"><br clear="none"><div><hr>Date: Tue, 30 Jun 2015 16:31:06 -0700<br clear="none">To: <a rel="nofollow" shape="rect" ymailto="mailto:kelvin@skysys.co.ke" target="_blank" href="mailto:kelvin@skysys.co.ke">kelvin@skysys.co.ke</a><br clear="none">CC: <a rel="nofollow" shape="rect" ymailto="mailto:isoc@lists.my.co.ke" target="_blank" href="mailto:isoc@lists.my.co.ke">isoc@lists.my.co.ke</a><br clear="none">Subject: Re: [isoc_ke] Fwd: [kictanet] Tough new rules force all Internet users to list their gadgets<br clear="none">From: <a rel="nofollow" shape="rect" ymailto="mailto:isoc@lists.my.co.ke" target="_blank" href="mailto:isoc@lists.my.co.ke">isoc@lists.my.co.ke</a></div></div></div></div><div><div dir="ltr"><div><div><br clear="none"><br clear="none">
<div>Security is a function of personal freedom. </div>
<div>This binary concept of privacy or security pushes people to compromise on privacy in the myopic idea that security if paramount. </div>
<div>However, unless the people feel safe enough to express themselves, share ideas, organize and basically have that democratic culture, the state understanding of security keeps drifting away from how the citizens understand it. </div>
<div><br clear="none"></div>
<div>Cyber crime is, as expected, related to growth in internet connection. Not just in Kenya but globally. Let no one sound the alarm as if Kenya is a special case. </div>
<div><br clear="none"></div>
<div>I think the solution lies most importantly in enabling the user defend herself online. 123456 is not a password, no Nigerian will send you USD250,000 just for sharing your name...and a host of behavioral reverse engineering tricks. </div>
<div><br clear="none"></div>
<div>That is our first line of defence, while investing seriously in technical capacity locally. </div>
<div><br clear="none"></div>
<div>How enforceable are these directives anyway? </div>
<div><br clear="none"></div>
<br clear="none"><br clear="none"><div>On Wed, Jul 1, 2015 at 2:19 AM, Kelvin Githira via isoc <span dir="ltr"><<a rel="nofollow" shape="rect" ymailto="mailto:isoc@lists.my.co.ke" target="_blank" href="mailto:isoc@lists.my.co.ke">isoc@lists.my.co.ke</a>></span> wrote:<br clear="none"><br clear="none"><blockquote style="border-left:1px #ccc solid;padding-left:1ex;"><div><div dir="ltr">Hi All, <div><br clear="none"></div>
<div>I will keep this as simple and as short as i can, just the way i know how to.</div>
<div><br clear="none"></div>
<div>The fight against cyber crime is wide and cannot just be won by casting the net on free wifi users. forms of crime vary from sms, phone calls. emails and on chat applications. </div>
<div><br clear="none"></div>
<div>To even get close to keeping cyber crime at bay a few things (among others) in my opinion will need to happen in no given order </div>
<div><br clear="none"></div>
<div>-cast the net wider to include the use of pen registers and as well as trap and trace devices by the law enforcement authority ( while doing so define what is to be surveyed, is it mass surveillance or only where there is suspicion of crime ? </div>
<div>-Substantiate between devices used to access and platforms used to access i.e a cell phone with mac address x and an email address used by user y ( while doing so define notification to unsuspecting users as well as define the Gag rule to ISP mandated on this process </div>
<div>-define broadly information revealed by "digital dialed" over circuit switched telephony networks as well as information reveled by addressing on packet switched internet networks. </div>
<div>- while tapping into this various forms of communication , law enforcement will need the cooperation of third parties such as the ISP's and telephone companies, to what extend i ask ? <br clear="none"></div>
<div><br clear="none"></div>
<div>again we are faced with the dilemma, how far should we allow our government to go in there efforts to protect us against crime and terrorism while protecting freedoms and privacy? or is it a case of giving up liberties for more security? Simply put others will argue that the intent is access the internet and sign up freely for surveillance. </div>
<div><br clear="none"></div>
<div><br clear="none"></div>
<div>regards, </div>
<div>kelvin </div>
<div>
<br clear="none"><div>On Tue, Jun 30, 2015 at 5:07 PM, Barrack Otieno via isoc <span dir="ltr"><<a rel="nofollow" shape="rect" ymailto="mailto:isoc@lists.my.co.ke" target="_blank" href="mailto:isoc@lists.my.co.ke">isoc@lists.my.co.ke</a>></span> wrote:<br clear="none"><blockquote style="border-left:1px #ccc solid;padding-left:1ex;">---------- Forwarded message ----------<br clear="none">
From: Grace Githaiga via kictanet <<a rel="nofollow" shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" target="_blank" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>><br clear="none">
Date: Tue, 30 Jun 2015 20:55:10 +0000<br clear="none">
Subject: [kictanet] Tough new rules force all Internet users to list<br clear="none">
their gadgets<br clear="none">
To: <a rel="nofollow" shape="rect" ymailto="mailto:otieno.barrack@gmail.com" target="_blank" href="mailto:otieno.barrack@gmail.com">otieno.barrack@gmail.com</a><br clear="none">
Cc: Grace Githaiga <<a rel="nofollow" shape="rect" ymailto="mailto:ggithaiga@hotmail.com" target="_blank" href="mailto:ggithaiga@hotmail.com">ggithaiga@hotmail.com</a>><br clear="none"><br clear="none">
Kenyans using Wi-Fi to connect to the Internet in public places will<br clear="none">
be required to register their mobile devices with the Kenya Network<br clear="none">
Information Centre (Kenic), under new rules aimed at fighting<br clear="none">
cybercrime.The customers will be required to provide their telephone<br clear="none">
numbers and identity card details, which can be used to track them<br clear="none">
down should they use their gadgets to commit cybercrimes such as fraud<br clear="none">
or hacking websites.<br clear="none">
Read on: <a rel="nofollow" shape="rect" target="_blank" href="http://www.nation.co.ke/news/CA-WiFi-Internet-Rules-Cybercrime/-/1056/2771118/-/mbci1a/-/index.html">http://www.nation.co.ke/news/CA-WiFi-Internet-Rules-Cybercrime/-/1056/2771118/-/mbci1a/-/index.html</a><br clear="none"><span><font color="#888888"><br clear="none"><br clear="none">
--<br clear="none">
Barrack O. Otieno<br clear="none"><a href="" rel="nofollow" shape="rect">+254721325277</a><br clear="none"><a href="" rel="nofollow" shape="rect">+254-20-2498789</a><br clear="none">
Skype: barrack.otieno<br clear="none"><a rel="nofollow" shape="rect" target="_blank" href="http://www.otienobarrack.me.ke/">http://www.otienobarrack.me.ke/</a><br clear="none"><br clear="none">
_______________________________________________<br clear="none">
isoc mailing list<br clear="none"><a rel="nofollow" shape="rect" ymailto="mailto:isoc@lists.my.co.ke" target="_blank" href="mailto:isoc@lists.my.co.ke">isoc@lists.my.co.ke</a><br clear="none"><a rel="nofollow" shape="rect" target="_blank" href="http://lists.my.co.ke/cgi-bin/mailman/listinfo/isoc">http://lists.my.co.ke/cgi-bin/mailman/listinfo/isoc</a></font></span>
</blockquote>
</div>
<br clear="none"><br clear="all"><div><br clear="none"></div>-- <br clear="none"><div>Kind Regards,<br clear="none">Kelvin Githira ----+254723284562<br clear="none">Business Development Manager <br clear="none"><a rel="nofollow" shape="rect" target="_blank" href="http://www.skysys.co.ke/">www.skysys.co.ke</a><br clear="none"><br clear="none"><br clear="none"><br clear="none"></div>
</div>
</div></div></blockquote></div><br clear="none"><br clear="none">_______________________________________________
isoc mailing list
<a rel="nofollow" shape="rect" ymailto="mailto:isoc@lists.my.co.ke" target="_blank" href="mailto:isoc@lists.my.co.ke">isoc@lists.my.co.ke</a>
<a rel="nofollow" shape="rect" target="_blank" href="http://lists.my.co.ke/cgi-bin/mailman/listinfo/isoc">http://lists.my.co.ke/cgi-bin/mailman/listinfo/isoc</a></div></div></div></div>
_______________________________________________<br clear="none">
kictanet mailing list<br clear="none">
<a rel="nofollow" shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" target="_blank" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br clear="none">
<a rel="nofollow" shape="rect" target="_blank" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br clear="none">
<br clear="none">
Unsubscribe or change your options at <a rel="nofollow" shape="rect" target="_blank" href="https://lists.kictanet.or.ke/mailman/options/kictanet/josiah.mugambi%40gmail.com">https://lists.kictanet.or.ke/mailman/options/kictanet/josiah.mugambi%40gmail.com</a><div class="yiv0421673934yqt6990345018" id="yiv0421673934yqtfd50204"><br clear="none">
<br clear="none">
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br clear="none">
<br clear="none">
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.</div></blockquote></div></div></div><br><div class="yqt6990345018" id="yqtfd49402">_______________________________________________<br clear="none">kictanet mailing list<br clear="none"><a shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br clear="none"><a shape="rect" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br clear="none"><br clear="none">Unsubscribe or change your options at <a shape="rect" href="https://lists.kictanet.or.ke/mailman/options/kictanet/wangarikabiru%40yahoo.co.uk" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/wangarikabiru%40yahoo.co.uk</a><br clear="none"><br clear="none">The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br clear="none"><br clear="none">KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.</div><br><br></div> </div> </div> </div></div></body></html>