Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using Wi-Fi to connect to the Internet in public places will be required to register their mobile devices with the Kenya Network Information Centre (Kenic), under new rules aimed at fighting cybercrime.

The customers will be required to provide their telephone numbers and identity card details, which can be used to track them down should they use their gadgets to commit cybercrimes such as fraud or hacking websites.

The gadgets that must be registered include laptops, mobile phones, iPads, e-readers and any other devices that can be used at a public Wi-Fi hot spots such as hotels and restaurants.

This implies that in addition to registering the SIM cards in the gadgets with either Safaricom, Airtel or Telkom Kenya, people who use Wi-Fi will be required to register their devices at the point where they access the Internet, be it in hotels, restaurants, offices and public transport vehicles.

The director-general of the Communications Authority of Kenya, Mr Francis Wangusi, gave the new directive after taking over as the new chairman of the Association of Regulators of Information and Communications for Eastern and Southern Africa (Aricea), the organisation mandated to fight cybercrime with the Comesa region.
“We will license Kenic to register device owners using their national identity cards and telephone numbers, the identity of a device will be known when it connects to Wi-Fi,” Mr Wangusi said at the annual general meeting held in Nairobi.

Failure by any establishment to adhere to the rules will compel Kenic to withdraw the Wi-Fi services used by the defaulting institutions.
“In case a crime is committed, we will then be able to trace people using national identity cards that were registered and their phone numbers keyed in during registration,” said Mr Wangusi.
The Communications Authority is also setting up a forensic laboratory to detect and neutralise impending cyberattacks.
Mr Wangusi said the authority will conduct a detailed study on the extent of web hackings in Kenya. According to him, cyberattacks were on the rise, with the banking sector being the biggest victim followed by government institutions.

The new rules will also require all Kenyan companies to host their websites in the country rather than outside. This would help avoid extra costs associated with sending data out to a different location and back again to the website owner.
Dr Abu Dafalla, the Comesa Director for Infrastructure, said that Kenya now leads in pushing the cybercrime agenda within the region.
“Criminals are carrying out illegal activities on the web and we must protect the region even us we focus on trade. A secure cyberspace will retain revenue loss. Credit card fraud alone is estimated at $37 billion annually in the region,” he said.
Last year, Kenya faced several cyber-threats when the Kenya Defence Forces social media account was hacked. The hacker, self-identified by the Twitter handle @Anon_0x03, also breached the National Environment Trust Fund’s website.

By registering devices used by every Kenyan, there is a possibility that such anonymous attackers can be located from wherever they operate within the country.
Mr Hillary Siele, the manager at Nanchang Hotel in Westlands, Nairobi, welcomed the move, saying it would help curb fraud targeting hotels, leading to loss of money and important documents.

Nation
 

« Some Notes About Wassenaar
Is The Tech Investment Bubble About To Burst ? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

F-Secure

F-Secure

F-Secure defends enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

AdviserCyber

AdviserCyber

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.