<div dir="auto">How does a company as powerful as Safaricom say it feels like it can't say no? It need to put its lobbying power into protecting its users instead of just pushing for moves that protect profits. I'm disappointed </div><div class="gmail_extra"><br><div class="gmail_quote">On 15 Mar 2017 12:41 p.m., "Mose Karanja via kictanet" <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><wbr>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word">It is indeed government’s role to surveil and keep people safe. However, this MUST be done within the legal boundaries. Unlawful access and sharing of data is the main issue here, not that there is surveillance. <div><br></div><div><br><div><blockquote type="cite"><div>On 15 Mar 2017, at 12:13, Ali Hussein <<a href="mailto:ali@hussein.me.ke" target="_blank">ali@hussein.me.ke</a>> wrote:</div><br class="m_-8326663307452122292m_6021420504853655737Apple-interchange-newline"><div><div dir="ltr"><div class="gmail_default"><font face="georgia, serif">Moses</font></div><div class="gmail_default"><font face="georgia, serif"><br></font></div><div class="gmail_default"><font face="georgia, serif">I'm really not surprised. It would be folly for us to think there's no widespread surveillance going on the world over - Not after Wikileaks and Snowden. America, that country that is supposed to know better is at the vanguard of this new widespread and impunity minded surveillance. So what makes us think our Government will be immune to this virus spreading the world over?<br></font></div><div class="gmail_default"><font face="georgia, serif"><br></font></div><div class="gmail_default"><font face="georgia, serif"><br></font></div><img src="http://t.sidekickopen16.com/e1t/o/5/f18dQhb0S7ks8dDMPbW2n0x6l2B9gXrN7sKj6v4LNdFMd_KMKRbM7xW4Wzv6P2zlZNzW26tGP91k1H6H0?si=6190904865718272&pi=3367ba0f-ef9e-45fe-a36c-180de67f634d" style="display:none!important" height="1" width="1"><div class="gmail_extra"><div><div class="m_-8326663307452122292m_6021420504853655737gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div style="margin:0in 0in 0pt"><b><font face="georgia, serif" size="2">Ali
Hussein</font></b></div><div style="margin:0in 0in 0pt"><b><font face="georgia, serif" size="2">Principal</font></b></div><div style="margin:0in 0in 0pt"><font face="georgia, serif" size="2"><b>Hussein & Associates</b></font></div><font size="2">
</font><p style="margin:0in 0in 0pt"><font size="2"> </font></p><div style="margin:0in 0in 0pt"><font size="2"><span style="font-family:georgia,serif"><span>T<font size="2">el: +254 713 60<font size="2">1113</font></font><br></span></span></font></div><div style="margin:0in 0in 0pt"><font size="2"><span style="font-family:georgia,serif"><span>Twitter: @AliHKassim</span><span></span></span></font></div><font size="2"><span style="font-family:georgia,serif">
</span></font><div style="margin:0in 0in 0pt"><font size="2"><span style="font-family:georgia,serif"><span>Skype: abu-jomo</span></span></font></div><div style="margin:0in 0in 0pt"><font size="2"><span style="font-family:georgia,serif"><span>LinkedIn: <a href="http://ke.linkedin.com/in/alihkassim" target="_blank">http://ke.linkedin.com/in/alih<wbr>kassim</a></span><a href="http://ke.linkedin.com/in/alihkassim" target="_blank"><span style="color:windowtext;text-decoration:none"></span></a></span></font></div><div style="margin:0in 0in 0pt"><font size="2"><span style="font-family:georgia,serif"><br></span></font></div><div style="font-size:small;margin:0cm 0cm 0.0001pt;background-position:initial initial;background-repeat:initial initial"><span style="font-size:9pt;font-family:georgia">13th Floor , Delta Towers, Oracle Wing,</span><span style="font-size:9.5pt;font-family:arial"></span></div><div style="font-size:small;margin:0cm 0cm 0.0001pt;background-position:initial initial;background-repeat:initial initial"><span style="font-size:9pt;font-family:georgia">Chiromo Road, Westlands,</span><span style="font-size:9.5pt;font-family:arial"></span></div><div style="font-size:small;margin:0cm 0cm 0.0001pt;background-position:initial initial;background-repeat:initial initial"><span style="font-size:9pt;font-family:georgia">Nairobi, Kenya.</span></div><font size="2"><span style="font-family:georgia,serif"><span><br><font size="1">Any information of a personal nature expressed in this email are purely mine and do not necessarily reflect the official positions of the organizations that I work with.</font></span></span></font><span style="font-family:"baskerville old face",serif;font-size:11pt"></span><span style="font-size:11pt"></span>
<span style="font-family:"baskerville old face",serif"></span></div></div></div></div></div></div></div></div></div></div></div></div>
<br><div class="gmail_quote">On Wed, Mar 15, 2017 at 11:15 AM, Mose Karanja via kictanet <span dir="ltr"><<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><wbr>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div style="word-wrap:break-word">Privacy International just released a chilling report on how Kenya’s National Security organs, and especially the Intelligence office, carries out unregulated communication surveillance with the aid of telecommunication companies and shares this with units of law enforcement outside the legal procedures. <div><div><br></div><div>-----</div><div><p class="MsoNormal"><b>Key
Revelations:</b><u></u><u></u></p>
<ul type="disc">
<li class="MsoNormal">Communications surveillance is
being carried out by Kenyan state actors, essentially without oversight,
outside of the procedures required by Kenyan laws. Intercepted
communications content and data are used to facilitate gross human rights
abuses - to spy on, profile, locate, track and ultimately arrest, torture,
kill or 'disappear' suspects.<u></u><u></u></li>
<li class="MsoNormal">Intelligence gained by
intercepting phone communications, primarily by the National Intelligence
Service (NIS), is regularly shared with units of the police to carry out
counter-terrorism operations, particularly the GSU-Recce company and
Anti-Terrorism Police Unit (ATPU). These police units have well-documented
records of abuses including torture and extrajudicial killing<u></u><u></u></li>
<li class="MsoNormal">Despite constitutional and other
privacy protections, telecommunications operators regularly hand over
customer data to both intelligence and law enforcement agencies. Sources
who spoke with PI feel that they cannot decline agencies’ requests.<u></u><u></u></li>
<li class="MsoNormal">The NIS appears to have direct
access to communication networks across Kenya. Direct access means an
actor has backdoor access the phone communications that flow through
service providers. In this case, it is unlikely that the network operators
had knowledge of the state's interception.<u></u><u></u></li>
<li class="MsoNormal">NIS officers use various
techniques to access both call content and call data records, including
using mobile interception devices. Further methods are documented in the
report.<u></u><u></u></li>
<li class="MsoNormal">Law enforcement agents are present
within telecommunications operators’ facilities with the providers’
knowledge. NIS are also informally present in the telecommunication
operators’ facilities, apparently undercover, according to current and
former telecommunications, Communications Authority and NIS staff
interviewed by Privacy International. This investigation details both the
'above the board' and informal practices. Agency and company responses to
requests for comment by Privacy International are included in the report.<u></u><u></u></li>
<li class="MsoNormal">In advance of the August 2017
Presidential elections, the Communications Authority has launched several
disturbing initiatives, including a project to monitor social media
content, whose potential capacities are discussed in this report.<font face="Times" style="font-size:10pt"><u></u><u></u></font></li>
</ul><div>——</div><div><br></div><div>You can read the full report here: <a href="https://privacyinternational.org/reports" target="_blank">https://privacyinternati<wbr>onal.org/reports</a> </div>
</div></div></div><br>______________________________<wbr>_________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/m<wbr>ailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/KICTA<wbr>Net/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/info%40alyhussein.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/m<wbr>ailman/options/kictanet/info%4<wbr>0alyhussein.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br></blockquote></div><br></div></div>
</div></blockquote></div><br></div></div><br>______________________________<wbr>_________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/m<wbr>ailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/KICTA<wbr>Net/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/sidney.ochieng%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/m<wbr>ailman/options/kictanet/sidney<wbr>.ochieng%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br></blockquote></div></div>