<p dir="ltr">Thanks Moses for sharing.</p>
<p dir="ltr">The law is very clear that any disclosure should be through a court order. According to this report, the weak point is the communications companies who "feel they cannot decline agencies' requests". The companies are clearly breaking the law by giving out such information. Given the competence our judiciary has shown of late, it would be interesting to see the price the communications companies may be made to pay if someone sued them.</p>
<p dir="ltr">We need stronger individuals entrusted with our information </p>
<div class="gmail_quote">On Mar 15, 2017 11:15 AM, "Mose Karanja via kictanet" <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word">Privacy International just released a chilling report on how Kenya’s National Security organs, and especially the Intelligence office, carries out unregulated communication surveillance with the aid of telecommunication companies and shares this with units of law enforcement outside the legal procedures. <div><div><br></div><div>-----</div><div>
<p class="MsoNormal"><b>Key
Revelations:</b><u></u><u></u></p>
<ul type="disc">
<li class="MsoNormal">Communications surveillance is
being carried out by Kenyan state actors, essentially without oversight,
outside of the procedures required by Kenyan laws. Intercepted
communications content and data are used to facilitate gross human rights
abuses - to spy on, profile, locate, track and ultimately arrest, torture,
kill or 'disappear' suspects.<u></u><u></u></li>
<li class="MsoNormal">Intelligence gained by
intercepting phone communications, primarily by the National Intelligence
Service (NIS), is regularly shared with units of the police to carry out
counter-terrorism operations, particularly the GSU-Recce company and
Anti-Terrorism Police Unit (ATPU). These police units have well-documented
records of abuses including torture and extrajudicial killing<u></u><u></u></li>
<li class="MsoNormal">Despite constitutional and other
privacy protections, telecommunications operators regularly hand over
customer data to both intelligence and law enforcement agencies. Sources
who spoke with PI feel that they cannot decline agencies’ requests.<u></u><u></u></li>
<li class="MsoNormal">The NIS appears to have direct
access to communication networks across Kenya. Direct access means an
actor has backdoor access the phone communications that flow through
service providers. In this case, it is unlikely that the network operators
had knowledge of the state's interception.<u></u><u></u></li>
<li class="MsoNormal">NIS officers use various
techniques to access both call content and call data records, including
using mobile interception devices. Further methods are documented in the
report.<u></u><u></u></li>
<li class="MsoNormal">Law enforcement agents are present
within telecommunications operators’ facilities with the providers’
knowledge. NIS are also informally present in the telecommunication
operators’ facilities, apparently undercover, according to current and
former telecommunications, Communications Authority and NIS staff
interviewed by Privacy International. This investigation details both the
'above the board' and informal practices. Agency and company responses to
requests for comment by Privacy International are included in the report.<u></u><u></u></li>
<li class="MsoNormal">In advance of the August 2017
Presidential elections, the Communications Authority has launched several
disturbing initiatives, including a project to monitor social media
content, whose potential capacities are discussed in this report.<font face="Times" style="font-size:10pt"><u></u><u></u></font></li>
</ul><div>——</div><div><br></div><div>You can read the full report here: <a href="https://privacyinternational.org/reports" target="_blank">https://<wbr>privacyinternational.org/<wbr>reports</a> </div>
</div></div></div><br>______________________________<wbr>_________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/<wbr>KICTANet/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/kivuva%40transworldafrica.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/options/kictanet/<wbr>kivuva%40transworldafrica.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br></blockquote></div>