Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using Wi-Fi to connect to the Internet in public places will be required to register their mobile devices with the Kenya Network Information Centre (Kenic), under new rules aimed at fighting cybercrime.

The customers will be required to provide their telephone numbers and identity card details, which can be used to track them down should they use their gadgets to commit cybercrimes such as fraud or hacking websites.

The gadgets that must be registered include laptops, mobile phones, iPads, e-readers and any other devices that can be used at a public Wi-Fi hot spots such as hotels and restaurants.

This implies that in addition to registering the SIM cards in the gadgets with either Safaricom, Airtel or Telkom Kenya, people who use Wi-Fi will be required to register their devices at the point where they access the Internet, be it in hotels, restaurants, offices and public transport vehicles.

The director-general of the Communications Authority of Kenya, Mr Francis Wangusi, gave the new directive after taking over as the new chairman of the Association of Regulators of Information and Communications for Eastern and Southern Africa (Aricea), the organisation mandated to fight cybercrime with the Comesa region.
“We will license Kenic to register device owners using their national identity cards and telephone numbers, the identity of a device will be known when it connects to Wi-Fi,” Mr Wangusi said at the annual general meeting held in Nairobi.

Failure by any establishment to adhere to the rules will compel Kenic to withdraw the Wi-Fi services used by the defaulting institutions.
“In case a crime is committed, we will then be able to trace people using national identity cards that were registered and their phone numbers keyed in during registration,” said Mr Wangusi.
The Communications Authority is also setting up a forensic laboratory to detect and neutralise impending cyberattacks.
Mr Wangusi said the authority will conduct a detailed study on the extent of web hackings in Kenya. According to him, cyberattacks were on the rise, with the banking sector being the biggest victim followed by government institutions.

The new rules will also require all Kenyan companies to host their websites in the country rather than outside. This would help avoid extra costs associated with sending data out to a different location and back again to the website owner.
Dr Abu Dafalla, the Comesa Director for Infrastructure, said that Kenya now leads in pushing the cybercrime agenda within the region.
“Criminals are carrying out illegal activities on the web and we must protect the region even us we focus on trade. A secure cyberspace will retain revenue loss. Credit card fraud alone is estimated at $37 billion annually in the region,” he said.
Last year, Kenya faced several cyber-threats when the Kenya Defence Forces social media account was hacked. The hacker, self-identified by the Twitter handle @Anon_0x03, also breached the National Environment Trust Fund’s website.

By registering devices used by every Kenyan, there is a possibility that such anonymous attackers can be located from wherever they operate within the country.
Mr Hillary Siele, the manager at Nanchang Hotel in Westlands, Nairobi, welcomed the move, saying it would help curb fraud targeting hotels, leading to loss of money and important documents.

Nation
 

« Some Notes About Wassenaar
Is The Tech Investment Bubble About To Burst ? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Secure Systems Innovation Corp (SSIC)

Secure Systems Innovation Corp (SSIC)

SSIC is a cyber risk analytics firm whose mission is to improve how businesses manage cyber risk through the power of data analytics. SSIC developed the X-Analytics cyber risk decisioning platform.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.

Cyex

Cyex

Cyex helps people to become cyber wise. We enable our clients to find, track and improve cyber awareness in one place.