<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div><span></span></div><div><div>Good points GG.</div><div><br></div><div>Will all due respect to the technocrats at CA this sort of blanket announcements in the age of Hackers and Identity Theft exposes them to ridicule and a lack of understanding of the current scenario where one's phone can be used or identity hijacked without one knowing. Here's an interesting post from the FTC's Chief Technologist.</div><div><br></div><div>Excerpt:-</div><div><br></div><div><span style="background-color: rgba(255, 255, 255, 0);">A few weeks ago an unknown person walked into a mobile phone store, claimed to be me, asked to upgrade my mobile phones, and walked out with two brand new iPhones assigned to my telephone numbers. My phones immediately stopped receiving calls, and I was left with a large bill and the anxiety and fear of financial injury that spring from identity theft. This post describes <a href="https://www.ftc.gov/news-events/blogs/techftc/2016/06/your-mobile-phone-account-could-be-hijacked-identity-thief#mystory" style="box-sizing: border-box; text-decoration: none;">my experiences as a victim of ID theft</a>, explains the <a href="https://www.ftc.gov/news-events/blogs/techftc/2016/06/your-mobile-phone-account-could-be-hijacked-identity-thief#othervictims" style="box-sizing: border-box; text-decoration: none;">growing problem of phone account hijacking</a>, and suggests ways <a href="https://www.ftc.gov/news-events/blogs/techftc/2016/06/your-mobile-phone-account-could-be-hijacked-identity-thief#whatyoucando" style="box-sizing: border-box; text-decoration: none;">consumers</a> and <a href="https://www.ftc.gov/news-events/blogs/techftc/2016/06/your-mobile-phone-account-could-be-hijacked-identity-thief#carriers" style="box-sizing: border-box; text-decoration: none;">mobile phone carriers</a> can help combat these scams.</span></div><div><span style="background-color: rgba(255, 255, 255, 0);"><br></span></div><div><span style="background-color: rgba(255, 255, 255, 0);">Read on:-</span></div><div><br></div><div><a href="https://www.ftc.gov/news-events/blogs/techftc/2016/06/your-mobile-phone-account-could-be-hijacked-identity-thief">https://www.ftc.gov/news-events/blogs/techftc/2016/06/your-mobile-phone-account-could-be-hijacked-identity-thief</a></div><div><br></div><div>We expect nothing less from the CA. Please guys upgrade your Regulation Tools from those that are meant to regulate Kenya Posts and Telecommunications Corporation and the Telegram Era to that of BlockChains, Distributed Computing, Mass Identity Theft, The Dark Web, Net Neutrality :-) and the Age of Snowden and Assange.</div><div><br></div><div>We expect nothing else guys. Away with this Command and Control Regulatory Thinking and embrace Crowdsourcing and Open Community Engagement. </div><div><br></div><div>We can help... <br><br><div><div><span style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373);"><b>Ali Hussein</b></span></div><div><span style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373);"><b>Principal</b></span></div><div><b style="background-color: rgba(255, 255, 255, 0);">Hussein & Associates</b></div><div style="font-family: Helvetica; font-size: medium; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto; ">+254 0713 601113 </div><div style="font-family: Helvetica; font-size: medium; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto; "><br></div><div><p style="margin: 0in 0in 0pt;"><span style="background-color: rgba(255, 255, 255, 0);">Twitter: @AliHKassim</span></p><span style="background-color: rgba(255, 255, 255, 0);"><font></font></span><p style="margin: 0in 0in 0pt;"><span style="background-color: rgba(255, 255, 255, 0);">Skype: abu-jomo</span></p><p style="margin: 0in 0in 0pt;"><span style="background-color: rgba(255, 255, 255, 0);">LinkedIn: <a href="http://ke.linkedin.com/in/alihkassim" target="_blank">http://ke.linkedin.com/in/alihkassim</a></span></p><font><br></font></div><div><span style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); "><br></span></div><div>"Discovery consists in seeing what everyone else has seen and thinking what no one else has thought". ~ Albert Szent-Györgyi</div><div><span style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373);"><br></span></div>Sent from my iPad</div></div><div><br>On 6 Jan 2017, at 2:32 PM, Grace Githaiga via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br><br></div><blockquote type="cite"><div>
Thanks Grace.<br><br>Two questions:<br><br>1. How do hawkers get these sim cards that they sell on the streets and in traffic?<br><br>2. Can guidelines serve as law under which people can be prosecuted?<br><br><br>Best regards<br>
<br>
<br>
Githaiga, Grace<br>
<br><br><br>On Friday, 06-01-2017 at 13:38 Grace Mutung'u (Bomu) via kictanet wrote:<br><blockquote style="border:0;border-left: 2px solid #22437f; padding:0px; margin:0px; padding-left:5px; margin-left: 5px; "><p dir="ltr">Listers, </p>
<p dir="ltr">" The Communications Authority of Kenya (CA) Friday issued the stern warning, saying every Kenyan is responsible for any use of their mobile number in making calls, sending and receiving text messages as well as any financial transactions.</p>
<p dir="ltr">The regulator says all Kenyans must only use registered SIM cards to transact business as they may be culpable in the event that their number is used in the commission of a crime."</p>
<p dir="ltr">Full story here:</p>
<p dir="ltr"><a target="_blank" class="blue" href="http://www.businessdailyafrica.com/Six-month-jail-term-for-Kenyans-whose-phones-are-used-in-crime/539546-3508084-k51vwl/index.html">http://www.businessdailyafrica.com/Six-month-jail-term-for-Kenyans-whose-phones-are-used-in-crime/539546-3508084-k51vwl/index.html</a></p>
</blockquote></div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>kictanet mailing list</span><br><span><a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a></span><br><span><a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a></span><br><span></span><br><span>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/info%40alyhussein.com">https://lists.kictanet.or.ke/mailman/options/kictanet/info%40alyhussein.com</a></span><br><span></span><br><span>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.</span><br><span></span><br><span>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.</span></div></blockquote></div></body></html>