<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.EmailStyle18
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle19
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal align=center style='text-align:center'><img width=864 height=367 style='width:9.0in;height:3.8229in' id="Picture_x0020_1" src="cid:image002.jpg@01D2F683.53553F10"><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p> </o:p></span></p><div><div style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b><span style='font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span></b><span style='font-size:11.0pt;font-family:"Calibri",sans-serif'> kictanet [mailto:kictanet-bounces+awatila=yahoo.co.uk@lists.kictanet.or.ke] <b>On Behalf Of </b>Mose Karanja via kictanet<br><b>Sent:</b> Thursday, July 6, 2017 1:34 PM<br><b>To:</b> awatila@yahoo.co.uk<br><b>Cc:</b> Mose Karanja <mosekaranja@gmail.com><br><b>Subject:</b> [kictanet] Privacy International report: Kenya's Cyber security plans and surveillance vulnerabilities this opens up<o:p></o:p></span></p></div></div><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>This report by Privacy International is instructive. <o:p></o:p></p><div><p class=MsoNormal><a href="https://www.privacyinternational.org/node/1476">https://www.privacyinternational.org/node/1476</a><o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal>—<o:p></o:p></p></div><div><p class=MsoNormal style='margin-bottom:12.0pt;line-height:18.0pt'><i><span style='font-size:8.5pt'>Particularly problematic, however, is the potential scale of monitoring that can be conducted, as well as the lack of transparency about what exactly will be visible and to whom. The NIDS/NIPDS is a monitoring centre housed under the KE-CIRT/CC with “screens with multiple dashboards for recording of various incidents/alerts of possible attack.” NIDS/NIPDS probes would be deployed at the critical nodes of Kenya’s internet backbone: at the Kenya Internet Exchange, at the submarine fibre optic cable landing sites, at the internet service providers and data carriers. </span></i><o:p></o:p></p><p class=MsoNormal style='margin-bottom:12.0pt;line-height:18.0pt'><i><span style='font-size:8.5pt'>Yet the system is not limited to monitoring broad flows of incoming and outgoing internet traffic in Kenya to detect anomalous patterns. The project appears clearly interested in monitoring content. </span></i><o:p></o:p></p><div><p class=MsoNormal>—<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>-Moses<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal><o:p> </o:p></p></div></div></div></div></div></body></html>