Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using Wi-Fi to connect to the Internet in public places will be required to register their mobile devices with the Kenya Network Information Centre (Kenic), under new rules aimed at fighting cybercrime.

The customers will be required to provide their telephone numbers and identity card details, which can be used to track them down should they use their gadgets to commit cybercrimes such as fraud or hacking websites.

The gadgets that must be registered include laptops, mobile phones, iPads, e-readers and any other devices that can be used at a public Wi-Fi hot spots such as hotels and restaurants.

This implies that in addition to registering the SIM cards in the gadgets with either Safaricom, Airtel or Telkom Kenya, people who use Wi-Fi will be required to register their devices at the point where they access the Internet, be it in hotels, restaurants, offices and public transport vehicles.

The director-general of the Communications Authority of Kenya, Mr Francis Wangusi, gave the new directive after taking over as the new chairman of the Association of Regulators of Information and Communications for Eastern and Southern Africa (Aricea), the organisation mandated to fight cybercrime with the Comesa region.
“We will license Kenic to register device owners using their national identity cards and telephone numbers, the identity of a device will be known when it connects to Wi-Fi,” Mr Wangusi said at the annual general meeting held in Nairobi.

Failure by any establishment to adhere to the rules will compel Kenic to withdraw the Wi-Fi services used by the defaulting institutions.
“In case a crime is committed, we will then be able to trace people using national identity cards that were registered and their phone numbers keyed in during registration,” said Mr Wangusi.
The Communications Authority is also setting up a forensic laboratory to detect and neutralise impending cyberattacks.
Mr Wangusi said the authority will conduct a detailed study on the extent of web hackings in Kenya. According to him, cyberattacks were on the rise, with the banking sector being the biggest victim followed by government institutions.

The new rules will also require all Kenyan companies to host their websites in the country rather than outside. This would help avoid extra costs associated with sending data out to a different location and back again to the website owner.
Dr Abu Dafalla, the Comesa Director for Infrastructure, said that Kenya now leads in pushing the cybercrime agenda within the region.
“Criminals are carrying out illegal activities on the web and we must protect the region even us we focus on trade. A secure cyberspace will retain revenue loss. Credit card fraud alone is estimated at $37 billion annually in the region,” he said.
Last year, Kenya faced several cyber-threats when the Kenya Defence Forces social media account was hacked. The hacker, self-identified by the Twitter handle @Anon_0x03, also breached the National Environment Trust Fund’s website.

By registering devices used by every Kenyan, there is a possibility that such anonymous attackers can be located from wherever they operate within the country.
Mr Hillary Siele, the manager at Nanchang Hotel in Westlands, Nairobi, welcomed the move, saying it would help curb fraud targeting hotels, leading to loss of money and important documents.

Nation
 

« Some Notes About Wassenaar
Is The Tech Investment Bubble About To Burst ? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Xobee Networks

Xobee Networks

Xobee Networks is a Managed Service Provider of innovative, cost-effective, and cutting-edge technology solutions in California.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.