KICTANet
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- 23 participants
- 12936 discussions
Re: [kictanet] [ke-internetusers] Kenya communications (amendment) Bill: Is media overacting?
by Wainaina Mungai 15 Dec '08
by Wainaina Mungai 15 Dec '08
15 Dec '08
Kaikai,
I propose we focus on the issues below:
1. Section 88 and the fact that the absence of the Presidential ascent
wouldn't change anything for atleast the next six months. The
suggestion is that media pursues the path of a "futher amendments"
Bill that shall be debated separately. There should be no guarantee it
will be passed.
2. Content regulation and the fact that it does not threaten freedom
of expression. The issues have been clarified here and in other fora.
3. The "Action Plan" of the Media Owners Association and the clauses
that indicate their willingness to abuse the power given to them. Put
this in context of the powers you want Kenyans to entrust you with.
You do not add value to the debate by branding as "media bashers" or
hypocrites those of us who have realised with time that absolute power
corrupts absolutely even in the media.
Regards,
Wainaina
On 12/16/08, Linus Kaikai <lkaikai(a)ktnkenya.com> wrote:
> Dr. Ndemo,
>
> It is puzzling that throughout your meetings with us we never got to hear of
> some of the issues you are now raising on Kictanet like 'Media impunity' and
> 'corrupting children minds.' The latter was of course the very same line
> used by Mao and later Deng Xiaoping to cut off information flow to the
> Chinese masses, and that is having concluded the entire population is made
> up of children! There's a great deal of dishonesty around this whole issue.
> The contentious clauses in my view are an extension of your ban of live
> broadcast on the evening of December 30; a ban that neither worked nor
> helped in way in pushing through suspect election results. Bwana PS the
> larger picture is the country is walking down a retrogressive path and the
> clauses in the Communication Bill are only part of a number of things that
> are going wrong especially with politics and governance. Bwana PS sections
> of this Bill are not anything you would be proud of 5 years from now.
>
> For the rest of the media-bashing crowd on Kictanet, yours is the hypocrisy
> killing our country. When Moi was president the media and outspoken
> diplomats were your heroes. Now they are villains. How convenient!
>
> About the bill, I am so keen to hear your take on the March 2, 2006 raid on
> the Standard and KTN for such are the actions the new bill would make
> perfectly legal!
>
>
> Linus
>
> -----Original Message-----
> From: kictanet-bounces+lkaikai=ktnkenya.com(a)lists.kictanet.or.ke
> [mailto:kictanet-bounces+lkaikai=ktnkenya.com@lists.kictanet.or.ke] On
> Behalf Of bitange(a)jambo.co.ke
> Sent: 14 December 2008 22:04
> To: lkaikai(a)ktnkenya.com
> Cc: KICTAnet ICT Policy Discussions
> Subject: Re: [kictanet] [ke-internetusers] Kenya
> communications(amendment)Bill: Is media overacting?
>
> Mike,
> Thank you for your objective views. You know very well that there are
> thousands of youth out there who have patiently waited for this bill to
> allow them trade on-line. Now Media calls theirs.
>
> The outcomes of the Kriegler and Waki would hopefully deal with political
> impunity. Who will deal with media impunity? In my view we must push
> this Bill to ensure that electronic media does not continue to corrupt our
> children's minds.
>
> Ndemo.
>
>
>> Dr. Ndemo,
>>
>> I hope that the media note that they are on the wrong path and move to
>> change their approach. In hindsight they might realize that the issues at
>> hand could have been tackled differently.The media's most recent actions
>> only make it more difficult to resolve the very same issues they are
>> protesting.
>>
>> The Nation's editorial perhaps represents the divergence in views between
>> the media owners, their supporters and responsible journalists who may
>> have
>> seen that things are steering in a dangerous direction. As the matter
>> drags
>> on, various elements will try to take advantage and jump onto the
>> bandwagon
>> to further certain agendas. It is this catalyst that is worrisome, as
>> there
>> is the possibility that just as the media issue has somehow been tied to
>> economic issues, the media issue could easily be misused by those who have
>> little to do with the media.
>>
>> The country has many volatile problems that should not be exploited, some
>> of
>> those jumping onto the media bandwagon may be seeking to detract from
>> matters facing them, others have personal agendas in mind that can only
>> progress if they are disguised as media and economic issues. The media
>> hopefully is looking at these issues in a responsible manner, will
>> exercise
>> diplomacy and engage the Government in a civil way as the best way to
>> resolve the impasse. There are many Kenyans suffering today from matters
>> not
>> within their control, it is a dangerous thing for the media to act in a
>> way
>> that could easily stir these masses to non-civil action as measures are
>> being taken to alleviate these problems. The media has a corporate
>> responsibility in ensuring that it exhausts all civil means of ensuring
>> the
>> matters are resolved.
>>
>> It is encouraging to know that the Government is open for discussion, but
>> there is only so much that the Government can do on legislative matters.
>> The
>> Government can draft, prepare and adjust laws but it cannot pass the same
>> in
>> parliament. The media must do more on its own in approaching not just key
>> leaders but ultimately the legislators who actually vote to pass the same
>> laws.
>>
>>
>> On Sun, Dec 14, 2008 at 5:11 PM, <bitange(a)jambo.co.ke> wrote:
>>
>>> Thanks Theuri,
>>> Since Government is open for discussion, diplomacy would yield better
>>> results. I have seen their action plan which by the way violates cck
>>> licence agreement it is not the best rout to take. Having spent all
>>> weekend
>>> using public resources (frequencies) to propagate violence, they should
>>> at
>>> least wait to hear from cck.
>>>
>>> If you read today's Nation editorial on how to end impunity including
>>> media
>>> impunity you wonder if they are the same people inciting the public to
>>> violence.
>>>
>>> Ndemo
>>> Sent from my BlackBerry(R)
>>>
>>> -----Original Message-----
>>> From: "Mike Theuri" <mike.theuri(a)gmail.com>
>>>
>>> Date: Sun, 14 Dec 2008 13:19:01
>>> To: <bitange(a)jambo.co.ke>
>>> Cc: KICTAnet ICT Policy Discussions<kictanet(a)lists.kictanet.or.ke>
>>> Subject: Re: [kictanet] [ke-internetusers] Kenya communications
>>> (amendment)Bill: Is media overacting?
>>>
>>>
>>> _______________________________________________
>>> kictanet mailing list
>>> kictanet(a)lists.kictanet.or.ke
>>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>>
>>> This message was sent to: bitange(a)jambo.co.ke
>>> Unsubscribe or change your options at
>>>
> http://lists.kictanet.or.ke/mailman/options/kictanet/bitange%40jambo.co.ke
>>>
>>>
>>
>> ----------------------------------------------
>> This message has been scanned for viruses and
>> dangerous content by Jambo MailScanner, and is
>> believed to be clean.
>> ---------------------------------------------
>> "easy access to the world"
>>
>>
>
>
>
> ----------------------------------------------
> This message has been scanned for viruses and
> dangerous content by Jambo MailScanner, and is
> believed to be clean.
> ---------------------------------------------
> "easy access to the world"
>
>
> _______________________________________________
> kictanet mailing list
> kictanet(a)lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>
> This message was sent to: lkaikai(a)ktnkenya.com
> Unsubscribe or change your options at
> http://lists.kictanet.or.ke/mailman/options/kictanet/lkaikai%40ktnkenya.com
>
>
> --
> This message has been scanned for viruses and
> dangerous content by MailScanner, and is
> believed to be clean.
>
>
>
> --
> This message has been scanned for viruses and
> dangerous content by MailScanner, and is
> believed to be clean.
>
>
> _______________________________________________
> kictanet mailing list
> kictanet(a)lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>
> This message was sent to: wainaina(a)madeinkenya.org
> Unsubscribe or change your options at
> http://lists.kictanet.or.ke/mailman/options/kictanet/wainaina%40madeinkenya…
>
--
Sent from my mobile device
---
http://www.bungesms.com
TWITTER - http://www.twitter.com/bungesms
KABISSA.org - http://www.kabissa.org/about/news/member-spotlight-made-kenya-network
KAMPALA Workshop presentation -
http://m4d.kcl.co.ug/sites/default/files/presentations/BungeSMS_MadeinKenya…
2
1
Re: [kictanet] [ke-internetusers] Kenya communications (amendment)Bill: Is media overacting?
by alice 15 Dec '08
by alice 15 Dec '08
15 Dec '08
Hi David
Below are excerpts from the "Action Plan"
........................................
Dear Members
Following this morning's meeting find attached today's press release,
presented at today's press conference by Vice Chairman Martin Khafafa.
The following is our action plan for at least the next week:
Our key objectives are:
· Ensure the bill is not signed in to law, therefore petition
the President in public through media campaigns and formally by
presenting the petition
· Shape public opinion through a media campaigns on all media
and talk shows – create a public debate
· Demonstrate this bill is unconstitutional and tramples on
Kenyan's hard fought media freedom; freedom of expression and freedom of
information
ACTION PLAN
1. Press conference – 11^th December 2008
2. Petition the President not to sign the bill in to law – the
formal petition is currently being drafted by Hon Paul Muite –
PQ/Martin, SK and Linus will follow this up. This petition will be
presented to the Prime Minister and Amb Muthaura next week. An
appointment with the president will be arranged for key MOA members to
present the petition
3. Media Campaign – starting today, we will run, radio, TV and
print advertising sensitizing the public why this bill is wrong
for Kenya. Key objective is to shape public opinion and educate them on
the bill. PQ is spearheading this campaign and will distribute the
advert to all members
4. Jamhuri Day – We will cover the event on TV, however we will
show a split screen with various scenes of attacks on media e.g Standard
raid, Royal Media, etc with scroll messages on the bill and what it
portends for media freedom and expression. Conrad of NMG is spearheading
this
5. Coverage of MPs and Ministry of Information – media blackout for
all MPs who voted for the bill and the Ministry of Information – Joe
Odindo will get copy of the Hansard and circulate to members
6. Joint headlines with different editorials – Print media will
have a joint headline – Joe, PQ and Wachira will co-ordinate
7. All media houses invite civil society, opinion leaders who
support media on this issue to their stations to educate audiences on
the bill; organize voting and other promotions for the public to
participate in the debate
8. Print media will run an education campaign show history of
"political repression" in various articles especially this weekend
The above action plan will run until we achieve our objectives, from
time to time members will consult and modify campaigns or adjust the
plans. All members will be informed of any changes.
Feel free to include your input, we need to be united on this issue and
speak from one page.
Kind regards
Sheila
MOA Secretary
dmakali(a)yahoo.com wrote:
> Wich media plan of action? Can anyone state here what is says or publish it please? This is typical strawman propaganda.
> If the media doesn't rep the public show me who goes, alice.
>
> Sent from my BlackBerry® wireless device
>
> -----Original Message-----
> From: alice <alice(a)apc.org>
>
> Date: Mon, 15 Dec 2008 10:38:48
> To: <dmakali(a)yahoo.com>
> Cc: KICTAnet ICT Policy Discussions<kictanet(a)lists.kictanet.or.ke>
> Subject: Re: [kictanet] [ke-internetusers] Kenya communications (amendment)
> Bill: Is media overacting?
>
>
> Dear Dr. Ndemo and all,
>
> The Media plan of action does indeed amount to some serious offenses,
> not least abuse of public resources. Also agree that we need an open
> parliament., we can not let the media claim to speak for the public
> anymore.
>
>
> best
> alice
>
>
> bitange(a)jambo.co.ke wrote:
>
>> Dear Edith,
>> We are uploading the published bill in the next one hour. It will indeed
>> help if everybody reads it before they make any comments. I would want
>> anybody to point any section in the published ammendment that limits press
>> freedom. You participated in most of our early interactions and the
>> intent on the broadcast section was very well understood - to introduce
>> proper regulatory mechanism.
>>
>> My friend Kaikai wants me to prove that in the past few days media has
>> been propagating violence. Most of you saw their plan of action which
>> lawyers tell me amounts to serous offence.
>>
>>
>> Ndemo.
>>
>>
>>
>>
>>
>>
>>
>>> It worries me that the masses are taking sides depending on what others
>>> say, rather than to read the bill themselves. Is there a "popular version"
>>> of the bill for ordinary Kenyans? Can we get a copy of the current bill or
>>> be pointed to where the latest version can be downloaded? This information
>>> is not necessarily within the public domain.
>>>
>>> It is high time we do not leave our future in the hands of afew, but let
>>> everyone be educated about the issues at hand so they can engage from an
>>> informed standpoint - we need an OPEN parliament. We have enough digital
>>> tools to allow interaction between parliament and the governed.
>>>
>>> Edith
>>>
>>> ________________________________________
>>> From: kictanet-bounces+eadera=idrc.or.ke(a)lists.kictanet.or.ke
>>> [kictanet-bounces+eadera=idrc.or.ke(a)lists.kictanet.or.ke] On Behalf Of
>>> alice [alice(a)apc.org]
>>> Sent: 14 December 2008 19:40
>>> To: Edith Adera
>>> Cc: KICTAnet ICT Policy Discussions
>>> Subject: Re: [kictanet] [ke-internetusers] Kenya communications
>>> (amendment) Bill: Is media overacting?
>>>
>>> David,
>>>
>>> Perhaps the media could start by reporting accurately. Some of the
>>> sections the media find so offensive already exist in the 1998
>>> communications act. So why not present the big full picture to all and
>>> especially the public?
>>>
>>>
>>> alice
>>>
>>> (Views expressed are personal and not a reflection of any of the
>>> organizations I am affiliated with)
>>>
>>>
>>>
>>> dmakali(a)yahoo.com wrote:
>>>
>>>
>>>> Wainaina
>>>> I can't argue against your sources but am certain that stage of black
>>>> out for mps hasn't been reached at all. In fact we are meeting tue to
>>>> evaluate exactly the import of the passage of that bill and bring every1
>>>> on the same page.
>>>> Of course blacking out not just some 25 mps but all is very much a
>>>> possible line of action. And for good reason- these mps did not consider
>>>> ANY of the changes we proposed. That gang approach doesn't lend itself
>>>> to decent engagement frm the media. They have abused their power and
>>>> ignored our views, not reasonably but glibly.
>>>> I am totally in agrment with thoz who argue the broadcast media needs
>>>> regulation, because it is true. I don't even share some defensive views
>>>> about ownership held by moa- I see no value in nmg getting more radio or
>>>> tv frequencies for eg coz they already have too many, or royal media
>>>> having all thoz frequencies. Its simply obscene. But that is a diff
>>>> story frm govt getting into micro management of media conent or , the
>>>> minister having power to raid and confiscate equipment or occupy or take
>>>> over a media house. There was no emergency wen michuki used mercenaries
>>>> to raid standard.
>>>> Plus the ethical issues being raised about content can and are already
>>>> addressed under the media act. The worst thing you want is to invite
>>>> govt fiat into content matters. You will rue the day you get a
>>>> dictatorial govt. Examples are many.
>>>> Similarly, how do you allow the minister to give directions to a
>>>> commission that's supposd to be independent? He shud take its advice not
>>>> rubber stamp his decisions. And how do you have a commission appointed
>>>> solely by the minister without any guidelines? Criteria to follow?
>>>> Finally did you see the clause about kbc? Nothing about its roles, and
>>>> obligations? Even the principal act is beta!
>>>> Well, wainaina and other kictanets, it would be useful to speak to these
>>>> issues even as you condemn the media for obviously lopsided reporting
>>>> and wailing.
>>>> David
>>>>
>>>> Sent from my BlackBerry® wireless device
>>>>
>>>> -----Original Message-----
>>>> From: "Wainaina Mungai" <wainaina(a)madeinkenya.org>
>>>>
>>>> Date: Sun, 14 Dec 2008 17:53:55
>>>> To: <dmakali(a)yahoo.com>; KICTAnet ICT Policy
>>>> Discussions<kictanet(a)lists.kictanet.or.ke>
>>>> Subject: Re: [ke-internetusers] Kenya communications (amendment) Bill:
>>>> Is media overacting?
>>>>
>>>>
>>>> David,
>>>>
>>>> I am very much involved the media and you & I know that it was agreed
>>>> that the Action Plan includes a "blackout to..." as well as all the
>>>> issues I indicated.The point is clear. I have told the truth relating
>>>> to the content of the Action Plan.
>>>>
>>>> The question of execution is separate. Ndemo having been on K24 is
>>>> does not change much but it is not in line with the Action
>>>> Plan....meaning, we need to complement K24 for that step.
>>>>
>>>> Let's be honest in our submissions especially concerning such
>>>> revelations.
>>>>
>>>> Wainaina
>>>>
>>>> On 12/14/08, dmakali(a)yahoo.com <dmakali(a)yahoo.com> wrote:
>>>>
>>>>
>>>>
>>>>> That's not true. You have obviously exaggerated in trying to put across
>>>>> your
>>>>> cheap propaganda. Ndemo was on k24 this morning and he was of course
>>>>> not
>>>>> opposing the bill. Plus, you should ask yourself, who has come out to
>>>>> support the bill and not been given airtime.
>>>>> Yes, the media is campaigning, but it has not yet agreed or employed
>>>>> any of
>>>>> the strategies you have listed. Their time is coming. And we don't
>>>>> need to
>>>>> go to previous regimes to show brutal attacks against the media. The
>>>>> worst
>>>>> have taken place under the current regime!
>>>>> You have more to be grateful than disgusted with the media. Be just a
>>>>> little
>>>>> more reflective and considerate otherwise your diabolical hatred of the
>>>>> media lacks foundation.
>>>>> David
>>>>> Sent from my BlackBerry(R) wireless device
>>>>>
>>>>> -----Original Message-----
>>>>> From: "Wainaina Mungai" <wainaina(a)madeinkenya.org>
>>>>>
>>>>> Date: Sun, 14 Dec 2008 17:08:09
>>>>> To: <dmakali(a)yahoo.com>
>>>>> Cc: KICTAnet ICT Policy Discussions<kictanet(a)lists.kictanet.or.ke>
>>>>> Subject: Re: [kictanet] [ke-internetusers] Kenya communications
>>>>> (amendment)
>>>>> Bill: Is media overacting?
>>>>>
>>>>>
>>>>> The truth is that the "supporters" you see on TV, hear on radio, read
>>>>> in papers are not by accident. The Media Owners Association (MoA)
>>>>> crafted a campaign strategy that includes the "media blackout to all
>>>>> MPs who supported the Bill and The Ministry of Information &
>>>>> Communications".
>>>>>
>>>>> According to persons privy to the media campaign strategy, we have a
>>>>> big problem here and it's about time Kenyans were told the objective
>>>>> truth. Unfortunately, the people who own the media houses are
>>>>> determined to use every possible means to ensure the Bill is not
>>>>> signed. You will not hear a supporter of the Bill being given
>>>>> coverage.
>>>>>
>>>>> Why?
>>>>>
>>>>> The strategy is clearly not intended to yield an objective result. The
>>>>> intention is to shape public opinion even through biased reporting.
>>>>> The strategy includes:
>>>>>
>>>>> 1. Ensure President dioesn't sign the Bill, by publicly petitioning
>>>>> him.
>>>>> 2. Take advantage of Jamhuri Day to show images of raids conducted by
>>>>> previous regimes.
>>>>> 3. Run a media campaign that includes 'same headline' in all papers
>>>>> and similar headlines on electronic media.
>>>>> 4. Shape public opinion through campains and show that the Bill is
>>>>> unconstitutional...etc etc
>>>>> 5. Blackout all supporters of the Bill, Ministry & only invite civil
>>>>> society players who support the interests of the media. Keep watching
>>>>> and you'll notice the biased reporting.
>>>>> 6. The coverage of the issue in the weekend papers (circulation) is
>>>>> also part of the strategy. This will not stop until the President
>>>>> yields to the Media's agenda.
>>>>>
>>>>> The media has the right to petition the President but the problem with
>>>>> their campaign is that Media Owners have actually agreed not to cover
>>>>> the issue objectively. They have conspired to shape public opinion by
>>>>> all possible means including excluding all those who have a different
>>>>> opinion.
>>>>>
>>>>> In doing so, they demonstrate the need for legislative regulation. The
>>>>> nation is now at the mercy of the media and the public will only be
>>>>> fed with one side of the story.
>>>>>
>>>>> Over to you.
>>>>> Wainaina
>>>>>
>>>>>
>>>>> On 12/14/08, Kinuthia Muchane <muchanek(a)gmail.com> wrote:
>>>>>
>>>>>
>>>>>
>>>>>> Habari,
>>>>>> Maybe the media is overacting, maybe the the MPs are wrong... But one
>>>>>> interesting thing about this issue is the timidity of the MPs, to
>>>>>> begin
>>>>>> with, in the news all I am hearing are our dear elected
>>>>>> representatives
>>>>>> vowing their undying support for all sorts of freedom, including that
>>>>>> of
>>>>>> Press, so my question is, isn't there one, single MP who supported
>>>>>> passing of the Bill who can come out in defence of his or her stand?
>>>>>> Or
>>>>>> is it because they always pander to the Press, they do not want to be
>>>>>> seen in 'bad' light .
>>>>>>
>>>>>> On the other hand, most of us take what we hear on the radio or watch
>>>>>> on
>>>>>> TV as gospel truth, and the unfortunate fact of life is that the
>>>>>> majority of us have no other source of information, or do not seek
>>>>>> other
>>>>>> avenues of
>>>>>> getting information, a fact very well
>>>>>> known by members of the so called "Fourth Estate". So when they drench
>>>>>> us with "details" about the dangers of the bill's amendment no matter
>>>>>> how
>>>>>> skewed their
>>>>>> opinion is, we will believe them hook, line and sinker!
>>>>>> If you ask me, in a country like ours with a very shaky social,
>>>>>> political and economic foundation, these merchants of
>>>>>> "information" should be very closely and regularly monitored, a Radio
>>>>>> Mille Collines can happen here very easily...
>>>>>> In any case, ain't all these media 'houses' just commercial
>>>>>> enterprises
>>>>>> out to make a tidy profit?
>>>>>>
>>>>>> Kinuthia...
>>>>>>
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> ke-internetusers mailing list
>>>>>> ke-internetusers(a)bdix.net
>>>>>> http://www.bdix.net/mailman/listinfo/ke-internetusers
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>> --
>>>>> Sent from my mobile device
>>>>>
>>>>> ---
>>>>> http://www.bungesms.com
>>>>>
>>>>> TWITTER - http://www.twitter.com/bungesms
>>>>>
>>>>> KABISSA.org -
>>>>> http://www.kabissa.org/about/news/member-spotlight-made-kenya-network
>>>>>
>>>>> KAMPALA Workshop presentation -
>>>>> http://m4d.kcl.co.ug/sites/default/files/presentations/BungeSMS_MadeinKenya…
>>>>>
>>>>> _______________________________________________
>>>>> kictanet mailing list
>>>>> kictanet(a)lists.kictanet.or.ke
>>>>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>>>>
>>>>> This message was sent to: dmakali(a)yahoo.com
>>>>> Unsubscribe or change your options at
>>>>> http://lists.kictanet.or.ke/mailman/options/kictanet/dmakali%40yahoo.com
>>>>>
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>> _______________________________________________
>>> kictanet mailing list
>>> kictanet(a)lists.kictanet.or.ke
>>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>>
>>> This message was sent to: eadera(a)idrc.or.ke
>>> Unsubscribe or change your options at
>>> http://lists.kictanet.or.ke/mailman/options/kictanet/eadera%40idrc.or.ke
>>> _______________________________________________
>>> kictanet mailing list
>>> kictanet(a)lists.kictanet.or.ke
>>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>>
>>> This message was sent to: bitange(a)jambo.co.ke
>>> Unsubscribe or change your options at
>>> http://lists.kictanet.or.ke/mailman/options/kictanet/bitange%40jambo.co.ke
>>>
>>> ----------------------------------------------
>>> This message has been scanned for viruses and
>>> dangerous content by Jambo MailScanner, and is
>>> believed to be clean.
>>> ---------------------------------------------
>>> "easy access to the world"
>>>
>>>
>>>
>>>
>>
>> ----------------------------------------------
>> This message has been scanned for viruses and
>> dangerous content by Jambo MailScanner, and is
>> believed to be clean.
>> ---------------------------------------------
>> "easy access to the world"
>>
>>
>> _______________________________________________
>> kictanet mailing list
>> kictanet(a)lists.kictanet.or.ke
>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>
>> This message was sent to: alice(a)apc.org
>> Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/alice%40apc.org
>>
>>
>>
>
>
>
> _______________________________________________
> kictanet mailing list
> kictanet(a)lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>
> This message was sent to: dmakali(a)yahoo.com
> Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/dmakali%40yahoo.com
>
1
0
Very interesting read in view of what is currently going on........
best
alice
http://egov-india.blogspot.com/
Monday, December 01, 2008
Ten Guiding Principles for E-civil Service
<http://egov-india.blogspot.com/2008/12/ten-guiding-principles-for-e-civil.h…>
/*Ten Guiding Principles for E-civil Service
by
D.C.Misra**/
_____________________________________________________________________________________
/*I Introduction*/
Is there anything called e-civil service or electronic civil service? If
so, what is it? How does it differ from the traditional civil service?
How can it keep pace with technological developments? What role does it
have in Government 2.0? Is there any conflict between old conduct rules
for the civil servants and the new environment? What role does e-civil
service play in the development of e-government? Does it require
separate recognition as an entity and support so that it can accelerate
the pace of development of e-government worldwide? Questions like these
must be asked and replies attempted as they have direct bearing on the
future course of development of e-government.
/*II E-civil Service*/
There are two primary drivers of e-government: technology vendors and
civil service. Technology vendors have succeeded in promoting
e-government but to a limited extent. Their limitation is that their
promotion of e-government is limited to their own technology. Civil
service has also promoted e-government but to a much lesser extent. Its
limitations are that it works under a rule-bound environment, is always
caught napping in technology developments, and above all, has no
motivation to promote e-government. Among the two, however, civil
service has greater stakes in e-government as it is required to serve
the government in power as well as citizens.
Government implements its decisions through civil service. The civil
service also provides policy inputs. Civil service is appropriately
described as the backbone of government as government policies and
programme can fail in implementation by the civil service or wrong
policies can be formulated with its help. What, however, is not
recognized is the quiet emergence of e-civil service or electronic civil
service in tandem with the emergence of e-government since mid-1990s. If
e-government is to succeed, not only the emergence of e-civil service
has to be recognized but strengthened as well so as to enable it face
the new challenge of e-government competently.
/E-civil service /or /electronic civil service /may be defined in two
important and markedly different senses:
/E-civil service /or /electronic civil service/: As the civil service
using information and communication technology (ICT) in conducting its
internal work and external public service delivery. It differs from the
traditional civil service on a number of important parameters. We will
refer to it as e-civil service or electronic civil service.
/Ai-civil service /or /artificial intelligence (AI) civil service/: As
artificial intelligence (AI) agents performing the civil service jobs,
say, determining amount of fine in traffic violations. Chun (2007)
describes application of artificial intelligence (AI) in immigration
control in Hong Kong special administrative region (SAR) by using
assessment rule engine, schema-based reasoning engine, workflow rule
engine, case-based reasoning (CBR) engine, and self-learning engine.
E-civil service and AI- civil service can be distinguished.
The emergence of e-government has increased the responsibility of civil
service by incorporating the requirements of e-civil service and
ai-civil service. In the initial stages of development of e-government,
the traditional civil service, e-civil service and ai-civil service will
all co-exist. E-civil service and ai-civil service are thus add-on to
the existing civil service and not its replacement. It is only in the
final stage that one can think of e-civil service and ai-civil service
replacing the traditional civil service, and that too only in part,
notwithstanding the projections of futurologists. However, e-civil
service and ai-civil service both will gain increasingly more ground
with the passage of time. In the new environment of e-governance,
therefore, the task of civil service has become quite enormous,
unprecedented and, yes, very challenging.
/*III An E-democracy Model Highlighting the Key Role of E-civil Service*/
An e-democracy model highlighting the key role of e-civil service can
now be proposed. The model proposes that (i) e-civil service is the
backbone of government and e-government, (ii) e-civil service is
required to serve democracy and e-democracy on the one hand and citizen
and e-citizen on the other, (iii) Democracy is characterized by rule by
majority, and adult suffrage, (iv) E-democracy is characterized by the
Internet and e-engagement, (v) Democracy-performance mismatch has
resulted in widespread embracing of e-government, and (vi) e-engagement
is an integral part of e-government.
/*IV Guiding Principles for Development of E-civil Service*/The
e-democracy model proposed above (Section III) highlights the key role
of e-civil service in promoting e-democracy. The coming into being of
e-civil service is raising a number of important issues, many of which
are unprecedented, which require to be addressed. Fountain (2007:6-7)
observes "In one sense, digital tools merely enhanced the power of a set
of reforms already underway and accepted as legitimate and appropriate
by civil servants. Yet the extraordinary power of the internet to allow
citizens to access government "anytime, anywhere," greatly increased
accessibility and made abstruse government documents and procedures, now
online, more glaringly unresponsive to citizens." The following ten
guiding principles are suggested for the development of e-civil service.
/*Principle 1. Recognise the Emergence of E-Civil Service*/
E-civil service is quietly entering the governments worldwide. However,
it has so far not been formally recognized. This has twofold
consequences. First, the non-recognition deprives e-civil service of any
systematic development as a result of which the quality of e-government
is adversely affected. Secondly, the non-recognition is leading to
piling up of issues which, with passage of time, are only getting more
complicated making their subsequent solution elusive, time-consuming and
costly. Thirdly, the application of artificial intelligence (AI) to
civil service tasks has given rise to, what this author has called,
artificial intelligence (AI) civil service, has also not being
recognized. New technologies create policy vacuums (Moor 1985). However,
the policy vacuum created by the emergence of e-civil service has so far
not been filled. It has thus become essential to formally recognize the
emergence of e-civil service.
/*Principle 2. Encourage Civil Service to Work Online*/
One of the main conclusions of case studies of e-government projects in
five countries-Argentina, Mexico, India, United Arab Emirates, and
Tunisia- analyzed to see how personnel issues slowed implementation of
e-government projects is that "High-level support does not ensure staff
buy-in." (WB 2005). There is so far no incentive for civil servants to
work online. As a result, adoption of e-government practices is slow in
civil service. The typical incentives are an entry of work done online
in annual performance appraisal, grant of an increment in salary for
doing good work, and formal recognition by grant of award for exemplary
work in e-government. These are, however, mundane incentives which have
only limited impact, if any. A mandatory policy may prove to be
counter-productive as it may invite hostility from civil servants.
Likewise an absence of policy will only maintain status quo. A middle
path may be a practical strategy. For example, a mandatory policy may be
adopted for routine tasks in the civil service like sanction of casual
leave, approval of tour programme and filing of property returns. For
rest of the tasks, civil service has to be encouraged to work online by
providing appropriate incentives.
/*Principle 3. Encourage E-civil Service to Use Web 2.0
Technologies*/The essence of Web 2.0 or Social Web is interactivity. And
Web 2.0 is a reality. Many civil servants lurk in discussion groups but
do not actively participate in discussion for fear of violating conduct
rules and inviting the wrath of their superiors. On their part, the
governments too have so far also not issued any guidelines on this
issue. In a pioneering attempt, Cabinet Office in United Kingdom has
issued the following guidelines: 1. Be credible, 2. Be consistent, 3. Be
responsive, 4. Be integrated, and 5. Be a civil servant (CO 2008). Clift
(2008) notes: "Every country needs a similar policy guide or
alternatively as a whole, their government will become irrelevant to
most people. Countries with civil servants disconnected online, have
disconnected democracies." Our civil services are still steeped in 19th
century ethos. They must now become civil services of 21st century. One
way to achieve this objective is to encourage e-civil service to use Web
2.0 technologies.
/*Principle 4. Recognise New Demands of Citizens on Civil Service*/
Civil service is known for not changing its way of working. History
proves this statement. Change when introduced is easily absorbed into
the system and the civil service quickly reverts to its old ways of
working. All this, however, appears to be changing in the age of
e-government. The emergence of e-government since mid-1990s has started
placing new demands on civil service. Not only is e-government changing
the way e-government works (for example, making it more
technology-oriented) and the work it does (for example, adding the
online work) but also citizen expectation from civil service. Citizens
now want value-added, tailor-made public service delivery online and,
what is more important from civil service point of view, hold the civil
service, and not its political masters, directly responsible for it. So
far civil service has worked protected under the cloak of anonymity.
This is no longer possible in the age of e-government which espouses the
cause of open and transparent government. These new demands of citizens
on civil service, therefore, need to be recognized.
/*Principle 5. Treat E-civil Service as an Instrument of Administrative
Reforms*/
Administrative reform is an uninspiring term. Its poor reputation comes
from its poor record of achievements so far. Kraemer and King (2005:2)
are of the view that "information technology has never been an
instrument of administrative reform; rather it has been used to
reinforce existing administrative and political arrangements." It is
difficult to subscribe to this view. If improving internal processes of
government is part of administrative reforms, then application of
information technology (IT) to government is very much a move for
administrative reforms. However, and it is important, application of
information technology (IT) to government, by itself, is not
e-government. What makes it e-government is the involvement of citizens
in decision-making processes of government, a dimension altogether
missing in earlier phases of application of information technology (IT)
to government. Since e-civil service, an altogether new development, is
the backbone of e-government, it has to be treated as an instrument of
administrative reforms.
/*Principle 6. Set Up an Exclusive Portal for E-civil Service*/E-civil
service now requires an exclusive portal for itself, catering to the
needs of civil servants in the era of e-government. Such a portal will
keep the civil servants fully updated about the latest rules and
regulations, up to date civil list, sanction of leave, physical fitness
exercise programmes and guidance, settlement of traveling allowance
(T.A.), medical and miscellaneous claims, career advancement
opportunities like mid-service training programmes, availability of
online inter-active training programmes and online technical support for
computer maintenance and use, annual performance appraisal, job
opportunities and career counseling. It should provide RSS feed so that
civil servants can keep themselves up to date with any development.
Likewise it should have a discussion group or blog and a wiki so that
civil servants could participate in them. This will be a closed portal
accessible only to serving civil servants and managed by an officer of
sufficient seniority. It will thus be a comprehensive one-stop service
to civil servants. Some governments have set up such sub-portals but
they do not provide comprehensive services.
/*Principle 7. Introduce E-recruitment to Civil Service*/
A Government Guide to Best Practice defines e-recruitment, also known as
online recruitment, as "the use of Internet and intranet technology to
recruit including candidate attraction, employer branding, candidate
tracking, candidate selection, and hiring." (CO 2007:65).The components
of e-recruitment are: (i) attracting candidates online to your website
or your organization, (ii) communicating your employer brand and
recruitment proposition online, (iii) tracking, communicating with and
selecting candidates online, (iv) testing candidates online, and (v)
on-boarding (otherwise known as welcoming and induction) candidates
online (ibid.:7). Many developed countries have set up recruitment
gatways. In United Kingdom, for example, the Cabinet Office has set up a
Civil Service Recruitment Gateway at
http://www.careers.civil-service.gov.uk/Index.asp?txtNavID=322&635132=
<http://www.careers.civil-service.gov.uk/Index.asp?txtNavID=322&635132=>.
Likewise Singapore Government has set up a recruitment portal at
https://app.vog.gov.sg/Presentation/index.aspx which it calls VOG
(lateral image of GOV). Other countries should follow suit.
/*Principle 8. Deal with Disciplinary Cases Online*/One of the sore
points with civil servants is the inordinate delay which the
disciplinary proceedings against them take in completion. Such
disciplinary proceedings call for penalties ranging from mere warning to
dismissal or removal from service and are typically launched while the
civil servant is in employment. These come in the way in his promotion
as and when such an opportunity occurs. The procedure involved in
dealing with disciplinary cases against the civil servants is quite
complicated and time-consuming. It is a case of e-government that such
cases can be expedited if dealt with online. In such a case the cause
list can be posted online, so also the documents upon which the
department proposes to rely to prove its case. The documents are
required to be supplied to the concerned civil servant under rules. The
final order too can be posted online. In case the facility of
video-conferencing is available, hearings in the case as well as
recording of evidence can be done online.
/*Principle 9. Sort Out Ethical Issues of E-civil Service*/
A number of ethical issues have started emerging as a result of civil
servants surfing the Internet while in office and otherwise also. First
is the maintenance of blog. Can a civil servant have a blog of his own
covering a subject dealt with by him? Second, can a civil servant
actively participate in discussion groups, communities of practice
(COPs) and social networking sites and defend or clarify his
department's position? Among these concerns, use of email at workplace
has gained attention as it is most widely used tool in e-government.
Oregon State Archives and Oregon Association of Municipal Recorders have
issued a very comprehensive E-mail Policy Manual for Local Government
(OSA n.d.) which has a template also. In India, the Department of
Administrative Reforms and Public Grievances (DARPG) has issued
comprehensive guidelines on use of email with due emphasis on e-mail as
an official record (DARPG n.d.). But not many civil servants are either
aware of these instructions or have only vague idea about them. The
emerging ethical concerns need to be sorted out.
/*Principle 10. Train E-civil Service in Government 2.0*/
Training is time-tested method for upgrading knowledge and skills of
civil servants. It is generally quite a challenging task when the
trainees are in-service civil servants but it is more challenging in
case of e-government as it involves concurrent training in technology
also. Schelin (2004, Table 5:272) suggests a training curriculum based
on six modules in which Digital Civic Engagement is the sixth model.
Whichever training module is selected, it is necessary that the civil
servants are systematically trained in Government 2.0, whose essence is
inter-activity which has been possible only by e-government tools, as
against out-of-date Government 1.0, which is based on one-way
communication from government to citizens. Training in Government 2.0
will include understanding the new role of civil servants, appreciation
of emergence of e-citizen and e-citizenship, understanding of e-concepts
associated with e-democracy, knowledge of e-engagement and
e-participation tools and, finally, involvement of e-citizens in public
policy formulation actively supported by e-civil service.
/*V Concluding Remarks*/
Weberian bureaucracy characterized by objectivity, administration by
rules, and anonymity is a remarkable improvement over earlier form of
civil service characterized by subjectivity and administration by whims
and fancies. The practice of Weberian bureaucracy, however, revealed a
number of weaknesses as a result of which a number of measures of
administrative reforms were undertaken in many countries prominent among
which is the re-inventing government movement or new public management
which requires running of government as a private sector corporation.
This too had a very limited success as the two- government and private
sector corporation- are based on fundamentally different premises,
namely, the former is based on service-orientation and the latter on
profit-orientation. E-government is the latest measure in administrative
reforms which makes a powerful assault on the weaknesses of existing
governments, particularly in their relation with their citizens.
However, the realization of full potential of e-government is still
eluding us. This can be achieved only if the emergence of e-civil
service is formally recognized and it is supported to enable it
discharge its new role. Ten guiding principles for e-civil service
developed here can help us in this regard.
References
Chun, Andy Hon Wai (2007): Using AI for e-Government Automatic Assessment of
Immigration Application Forms,
http://www.cs.cityu.edu.hk/~hwchun/research/PDF/iaai_2007.pdf
<http://www.cs.cityu.edu.hk/%7Ehwchun/research/PDF/iaai_2007.pdf>
(accessed : November 25, 2008).
Clift, Steven (2008): UK Government Advises Civil Servants How to
Participate Online, DoWire.org, June 21,
http://www.dowire.org/notes/?p=417 (accessed: November 25, 2008).
CO (Cabinet Office) (2007): E-recruitment projects in the public sector:
A Government Guide to Best Practice, Second Edition,Written By WCN Plc
on behalf of HM Government,
http://www.careers.civil-service.gov.uk/userfiles/DTI/e-recruitment%20guide…
<http://www.careers.civil-service.gov.uk/userfiles/DTI/e-recruitment%20guide…>
(accessed: November 29, 2008)
CO (Cabinet Office) (2008): Principles for participation online, London,
United Kingdom, the Author
http://www.civilservice.gov.uk/iam/codes/social_media/participation.asp
(accessed: November 25, 2008).
DARPG (Department of Administrative Reforms and Public Grievances)
(n.d.): E-mail Management Guidelines,
http://darpg.nic.in/arpg-website/eReference/e-mail-mgmt.doc (accessed:
November 29, 2008)
Fountain, Jane E. (2007): Bureaucratic Reform and E-Government in the
United States: An Institutional Perspective, Amherst, University of
Massachusetts, National Center for Digital Government, Center for Public
Policy and Administration, Department of Political Science, NCDG Working
Paper No. 07-006, September 18,
http://www.umass.edu/digitalcenter/research/working_papers/07_006FountainBu…
(accessed: November 26, 2008).
Kraemer, Kenneth and L. John Leslie King (2005): Information technology
and administrative reform:
will e-government be different? August,
http://www.si.umich.edu/~jlking/IJEGR-Final.pdf
<http://www.si.umich.edu/%7Ejlking/IJEGR-Final.pdf> (accessed: November
28, 2008)
Moor, James H. (1985): What is Computer Ethics? in Bynum, Terrell Ward
(ed.) (1985), Computers & Ethics, Blackwell, pp.266 – 75,
http://www.southernct.edu/organizations/rccs/resources/teaching/teaching_mo…
(accessed: November 24, 2008).
OSA (Oregon State Archives) and Oregon Association of Municipal
Recorders (n.d.): E-mail Policy Manual for Local Government,
http://arcweb.sos.state.or.us/recmgmt/train/erm/email/emailman806.pdf
(accessed: November 29, 2008)
Schelin, Shannon Howle (2004): Training for Digital Government, in
Pavlichev, Alexei and G.David Garson (eds.) (2004): Digital Government:
Principles and Best Practices, Hershey, PA, Idea Publishing, Chapter
XVII, pp 263-275.
WB (World Bank) (2005): Staff incentives and project implementation:
lessons from e-government, PREM notes: Public Sector, October, Number
101, http://www1.worldbank.org/prem/PREMNotes/premnote101.pdf (accessed:
November 26, 2008).
_______________________________________________
AfrICANN mailing list
AfrICANN(a)afrinic.net
https://lists.afrinic.net/mailman/listinfo.cgi/africann
1
0
W3C Call for Participation: Africa Perspective on the Role of Mobile Technologies in Fostering Social and Economic Development April 1-2 2009, Maputo, Mozambique
by alice 15 Dec '08
by alice 15 Dec '08
15 Dec '08
(Apologies for cross posting)
http://www.w3.org/2008/10/MW4D_WS/
The W3C Workshop on the "Africa Perspective on the Role of Mobile
Technologies in Fostering Social Development" aims to understand
specific challenges of using mobile phones and Web technologies to
deliver services to underprivileged populations of Developing Countries,
and to capture the specificities of the African context.
There are today more than half of the population living with less than
3$ a day, and lacking all kind of services (health, education,
government...). The incredible growth of the mobile penetration rate
last few years is providing a new hope. The potential of simple ICT
services on mobiles to improve people's income has indeed been largely
demonstrated. The aim of this workshop is to explore how to leverage
these success stories and create an enabling environment that would
drive the appearance of numerous services all over the Developing World.
People and organizations who have an interest in the role of mobile
phones and the Web in social and economic development and who wish to
participate in the workshop are invited to submit statements of interest
/ abstracts / position papers to the Workshop Committee (by email to:
team-m4d-ws-submit(a)w3.org)
This is a Workshop of the W3C Mobile Web Initiative (MWI), which aims to
identify and resolve challenges and issues of accessing the Web when on
the move.
This Workshop is part of the the Digital World Forum project (European
Union's 7th Research Framework Programme - FP7) which explore how to
take advantage of the new paradigm of low-cost technologies in broadband
infrastructure and devices to bridge the digital divide and connect the
unconnected.
W3C thanks Workshop host, the Ministry of Science and Technology of the
Government of Mozambique.
Sponsorship:
You are cordially invited to sponsor this workshop. Following in the
model of the successful sponsorship program developed for the 2006
Mobile Web in Developing Countries Workshop, and the 2008 Workshop on
the Role of Mobile Technologies in fostering Social Development, we
expect you will want to consider participating in the program for this
important meeting.
This sponsorship program is a marketing opportunity that enable sponsors
to showcase their organization and underscore its commitment to the
shared goals of the W3C. Sponsors reach those who are making decisions
about the future of the Web, as well as those in the public who have
come to rely on the Web as critical infrastructure for development and
to help bridging the Digital Divide. Sponsors will be associated
directly with the event which will gather at the same place experts in
mobile Web technologies, and experts in the Digital Divide in order to
use the Web and mobile phones to leverage development in rural areas of
developing countries.
There are three levels of sponsorship, Platinum-Gold-Silver, offering a
panel of benefits. All the details of each level are available from the
Sponsorship Program page.
This sponsorship program is designed to enable participation by
individuals and organizations with particular expertise, but who might
not otherwise be able to attend due to travel or other costs.
For further information and expression of interest, please contact
Stéphane Boyera (boyera(a)w3.org) or Marie-Claire Forgue (mcf(a)w3.org)
The deadline for requesting to take part in this opportunity is March
15, 2009.
Background
------------------------------
Since its creation in 1989 by Sir Tim Berners-Lee, the Web has grown
from one user to more than 1.5 billion of users in 2008, creating
services, providing information, connecting people, creating new jobs
and completely new sectors of activities. Despite this incredible
success in a such a short timeframe, there are still today more than 4.5
billion people that are not benefiting from this Information Society.
However, the Web, and Information and Communication Technologies (ICT)
in general, has been recognized as a great tool to potentially resolve
the historical divides between developed and developing economies by
providing an infrastructure to deploy minimal services (Health,
Education, Business, Government...) to rural communities and
under-privileged populations. That is why many actions have been engaged
in the last twenty years towards bridging the so-called Digital Divide.
Unfortunately, these actions - often focussing on telecenters - have had
little success so far. This model has encountered many difficulties due
to the local conditions (lack of electricity, lack of maintenance
skills….) and very few have reach long-term sustainability and continued
operation.
Since 2-3 years a new hope is coming with the very high penetration rate
of mobile telephony in developing countries. Now a minimal
infrastructure (GSM networks) and minimal computing power (mobile
phones) are available in the pockets (or at least in their very close
environment) of billions of people, including the poorest segment of the
population. Most developing countries who missed the telephony
revolution due to lack of infrastructure and required investments have
participated in the mobile revolution directly. Can this be repeated for
the Web? Four years ago, the W3C with the mobile industry have launched
the Mobile Web Initiative to make mobile phone users first class Web
citizen, and the number of people accessing the Web from mobile phones
is growing very quickly. Would it be possible that, like for telephony,
most Developing Countries will skip the PC-Web revolution and jump
directly on the next phase, the Mobile Web?
In May 2008, W3C has launched the Mobile Web for Social Development
Interest Group to explore this direction, and understand the type of
actions that could support and leverage this transition. This is the
theme of this workshop.
For under-privileged people to benefit the Web, they need to be able to
access it, and find accessible, usable and useful information and
services that would help them, and that is worth the resource they put
to learn and connect. Therefore, it is critical to explore the two
aspects of access and content, as well as the education needs.
Regarding access, it is critical to understand the key challenges and
barriers that targeted end-users (underpriviledged populations of
Developing Countries) have to access and use mobile services. This
includes affordability, usability, illiteracy, accessibility and
internationalization/localization issues.
Regarding content, the key question is creating an enabling environment
for the creation of information and services that people need and that
would improve their lives. In the last 2 or 3 years, we witnessed the
appearance of success stories of that demonstrated how relatively simple
services on mobile could be really helpful. However, the number of these
success stories is still low, and they are all based on a limited
technology, SMS. This workshop is aiming at identifying the issues,
barriers, needs and challenges the potential providers of
development-oriented services, mostly NGO/grass-root organizations and
governments/public sector have to develop and deploy those services, and
to exploit the potential of the mobile platform.
Regarding education, it is essential to understand what are the needs of
the different actors (NGO/grass-root organizations, IT sector, potential
entrepreneurs,...), and what kind of education material could help
disseminating the expertise and enabling people about developing
services and content on mobile phones.
As an input to this workshop, the W3C team has written a public white
paper that summarizes some of these issues. The W3C Mobile Web for
Social Development Group is also developing a set of documents which
should serve as input to potential participants.
Scope
The goal of the workshop is to provide input and feedback to the W3C
Mobile Web Initiative, and its Mobile Web for Social Development
Interest Group. The following topics are of particular interest:
* Analysis of use-cases / real-world projects on
o use of mobile phones in development projects,
o use of the Web in development projects,
o deployment of public services using mobile devices in developing
countries.
* Strengths and weaknesses of SMS technology vs mobile Web vs voice
technology
* Regional differences in Asia/Africa/Central Europe/Middle East/South
America/etc.
* Challenges of integrating ICTs in rural communities
* Usability and Human-Computer Interfaces (HCI) challenges of mobile
browser and mobile content for population without technological
background and prior computer experience
* Challenges and potential solutions against illiteracy
* Usage of mobile technologies in emergency responses in rural areas
* Analysis on the way the mobile phones and/or the Web could improve
people's lives in Developing Countries (education, healthcare, etc.)
* Role of voice and multimodal technologies/applications
* Challenges of developing and deploying numerous ICT services to rural
communities
* Comparison between different potential platforms to support ICT's
deployment (mobile phones, low-cost laptop, telecenters, and so on)
* Opportunity and challenges of ICTs in social/human development
* Challenges of sustainability, scalability and replicability
* Challenges and opportunity of integrating mobile phones in specific
domains: eGovernment projects (mGovernment), e-health projects, disaster
management,....
Who should attend ?
W3C encourages W3C Members and public to participate in the Workshop.
Workshop organizers expects that this workshop should be of particular
interest to people with following backgrounds:
* Charitable Foundations funding and/or managing Development projects
using ICTs
* Companies or Organizations providing ICT-related products, services,
content, applications or infrastructure in Developing Countries.
* People with grassroots experience on the use of ICT in Development
* People from the ICT for Development (ICT4D) domain
* People with a mobile background
* People with an eGovernment background
* Web experts
* Accessibility experts
* Digital Divide experts
* People expert in mobile HCI in Developing Countries
* People expert in the use of mobile phones in Development
Workshop Dates
The workshop will take place on April 1-2 2009.
Venue
The exact venue is still under consideration. Details will be soon
available.
Languages
Statements of Interest, abstracts, position papers and presentation
slides must be in English. The workshop will have a real-time
simultaneous translation in Portuguese, English and French. Therefore,
speakers and presenters can use any of these three languages.
Participation
To ensure productive discussions, the workshop is limited to 100
attendees. Participation is open to non-W3C members. Each organization
can provide at most two attendees.
Statement of interest are required in order to participate in this
workshop (except for W3C team members). Each organization or individual
wishing to participate must submit a statement of interest at
team-m4d-ws-submit(a)w3.org explaining their interest in the workshop as
soon as possible and no later than February 12, 2009. The intent is to
make sure that participants have an active interest in the area, and
that the workshop will benefit from their presence. The Program
Committee will select attendants based on their statement of interests
and the number of available seats.
Each organization or individual wishing to have a position paper
published on the workshop web site and/or wishing to make a presentation
during the event must submit an abstract no later than January 12, 2009.
The Program Committee will then review these abstracts, select some of
them for presentation, and request the full papers from the authors. The
decision of the Program Committee will be notified to the authors by
January 25, 2009.
Send abstract (in valid XHTML/HTML (please use the W3C Markup Validation
Service) or PDF or Plain Text - 1 to 2 pages) to: team-m4d-ws-submit(a)w3.org
All papers from accepted abstract will be available from the workshop
Web site. The workshop Web site will be public, so papers and slides
must be suitable for public dissemination. Speaker slides will also be
available at the Web site after the workshop. There will not be printed
proceedings.
To attend, you must register by filling out a registration form. The URI
for the registration form will be sent to you after your statement of
interest is accepted.
There will be no participation fee.
Press representatives must contact w3t-pr(a)w3.org and/or Marie-Claire
Forgue, W3C Communications (mcf(a)w3.org)
Agenda
The agenda will be published after the selection of abstracts by the
Program Committee.
Important Deadlines
Please note the following dates:
* As soon as possible - Statements of interest
* January 12, 2009: Abstract submission
* January 25, 2009: Committee Decisions on participations and abtract
selection
* February 20, 2009: Agenda and registration open
* March 15, 2009: Final presentations available and registration closed
* April 1-2, 2009: Two Days Workshop in Maputo, Mozambique
Contact
Enquiries or comments on the workshop can be sent to the public mailing
list public-mw4d(a)w3.org.
1
0
Mr Robert,
I read the article in the papers yesterday and couldn’t help but echo some of your questions on this mail list that unfortunately have not yet been responded to.
Of key interest is the following:
Whats the plan for procurement? tender or 'donated'? To me this is a perfect opportunity to set up a partnership for local assembly with any of the big boys - Acer, Dell, HP etc to set up an assembly plant with a 2 year clear handover to Kenyans, part of the deal should have initial 80% local employment with clear skill transfer built in so that in 18 months you have 99% local employment at the plant. Do the math 1,000,000*40,000 kshs ( assumed price) = Lots of money. This is a deal that anyone would salivate for.
Will the computers have MS Office or Linux - Again do the math as its likely to be the former.
What about capacity building? Planned for or just wish ful thinking?
Was there a need analysis carried out to determine that it is indeed Laptops required?
So to me procurement of laptops should never be an option. As we already have the madaraka project in place, why not up skill and upscale this to meet this demand for the 1 million laptops. Or is Madaraka over?
Secondly , the target group, I think you have it right, whats this about 'rural'? What is rural in Kenya? is it Turkana, Marsabit, Wajir, Nyeri, Malindi, Kibira? We need a clear cut definition and probably a sector by sector prioritization based on Vision 2030 and logically what will reap benefit to the Kenyan economy. Don’t get me wrong we must develop Kenyans consistently with a strong plan not hide behind the Rural Urban divide.
I raise some of these concerns because last week I was eavesdropping on a launch at one of our Key hotels in Kenya . A Major computer chip manufacturer was launching their East African offices. They showcased their effort being a certain school in Nairobi having received some special student laptops and the school was showing how learning was improved. All good, but the purpose of the Launch? To make an appeal to the PS MOE to consider 'partnering' with this company to sell 240,000 laptops to the teachers in Kenya( wow I thought what a marketing gimic is this how it’s done?)Will this lead to a pronounce from MOE of some 240,000 Laptops for teachers???? Hook and bait? Anything further than this would be speculation.
I agree teachers need laptops (computers maybe), but once again can we plan collectively as a government to work in unison and benefit locals on employment and empowerment? It CAN be done.
Which brings me to the reason for this email.
Shouldnt there be some kinds of checks and balances in place in our Ministries? Is there a way that 'we' can be involved before some of these utterances are made?
We have two PS's of different Ministries each thinking along the same paths both with good ideas, but I worry on the path to execution. Of these 1 million Laptops Ndemo speaks of - what percentage for his fellow teachers? Jua Kali artisans?, Medical students. Is there a master plan being followed? or is it pure chance ?
Dr Ndemo,I am sure there is a simple enough response to the queries raised above. I sincerely hope you will take the time to respond, and put my mind and probably others as well? at rest.
Ms. Basly.
______________________________________________________________________
Hi Dr. Ndemo,I felt it would not be fair to close the year with one final outburst on your ministries policies.It was good to see that the governement will be giving laptops to youth in the rural area. http://www.nation.co.ke/business/news/-/1006/499894/-/jh30hdz/-/index.html Last time I checked 80% of the students in the University are from the "rural areas" would it not make more sense to first equip them with the necessary tools. I recently talked to IT degree students at Nairobi university and was shocked to find that less than 5% have computers dedicated to them and this are not provided by the institution but have been bought privately.It is good to talk of empowering the rural folk but is this the best way, should we not begin at the top and work our way down. This computers would also provide greater mileage if we example they where to be giving to to students in teacher training colleges so that they can take technology to the schools, country wide that they will be posted to after they graduate?Also do not forget the medical students who would be able to provide better medical services if they knew how to use and had access to the internet's resources.Another major issue that is lacking from the story is how the laptops are to be procured, is there any likelihood that they will be assembled locally as if they are we shall be killing to birds with 1 stone.
Robert YaweKAY System Technologies LtdPhoenix House, 6th FloorP O Box 55806 Nairobi, 00200Kenya
Tel: +254722511225, +254202010696
_______________________________________________kictanet mailing listkictanet@lists.kictanet.or.kehttp://lists.kictanet.or.ke/mailman/listinfo/kictanet
_________________________________________________________________
Discover the new Windows Vista
http://search.msn.com/results.aspx?q=windows+vista&mkt=en-US&form=QBRE
9
17
Re: [kictanet] [ke-internetusers] Kenya communications (amendment)Bill: Is media overacting?
by Mike Theuri 15 Dec '08
by Mike Theuri 15 Dec '08
15 Dec '08
David,
The top level meetings apparently yielded some results. Apart from the
Minister, it would be interesting to see how the legislators who were
consulted voted or if they even attended the session. The efforts with the
parliamentary committee did not go to waste, Hon. Rege did attempt to
introduce amendments based on the meetings, but it has been reported that
only 25 MPs were present. The media could have done better in lobbying MPs
to be present for the vote. Had the media managed to locate 30 legislators
in favour of the amendments and ensured they attended the proceedings, the
matter would not be in its current state.
I think it would be quite reasonable if the media accepted to have a
compromise on the issues. It would not be right for the media to declare
that it is for 'all or nothing at all', it would be selfish and self serving
to deny the public of the bill's greater benefits by failing to compromise.
The controversial clause has been present for many years now, if someone
wanted to lynch the media, they would not need the new bill to do so. At the
same time is the media aware of an event that will certainly occur that
could be termed a national emergency resulting in 'raids'? Does the media
have something up its sleeve that it is not keen to reveal publicly? I
believe the answer to both of these questions is no. The media has nothing
to worry about if it self regulates and exercises good judgement. The media
has had many opportunities to self regulate, but some content that is
broadcast or published is appalling, inappropriate and is certainly a factor
that had led many to believe that the media needs hand holding.
Sensationalism is not a prerequisite for good journalism, neither do
newspapers need to turn into tabloid publications in order to sell.
Professional and objective journalism will always sell itself without having
to stoop low. As the saying goes, chema chajiuza, kibaya chajitembeza.
The media might be surprised to find that favour can be found by approaching
the issue in a positive rather than in a doom and gloom manner. The
media/activists are reported to have spent Ksh 2m to advertise a 'prayer
meeting' this past weekend. Wouldn't the media have done well to use such
resources to educate the public positively and not engage in what borders on
incitement? It is not necessary to label everything 'bad'. For example, why
not publish or explain, what clause 88 is, its history, what is means for
the industry and offer a number of alternative scenarios and recommendations
on what should be done. A good example would be how commercial concerns
express their views in opposition to legislative proposals without appearing
to be antagonistic, given the focus of this forum, an ICT example would fit
in well: http://www.ebaymainstreet.com/federal/net-neutrality/
The failure to recommend or offer suggestions as to what should be done does
not help the media's case. If the President does not sign the bill, he will
have to send the bill back to Parliament with a memorandum, how are the
public, legislators and concerned parties supposed to know what the media
would like the memorandum and bill to contain? By embracing the positive
aspects of the bill, the media is likely to find allies in both the public
and private sectors willing to support their position. When businesses,
banks, investors are turned off by the media's approach of 'killing' the
entire bill and wading in dangerous territory, the media is bound to seen as
a villain of the very parties it relies on for some of its revenue.
It is not an extraordinary effort for the media to seek out 50 MPs even 100
or more if need be, some of whom may not have read the bill, put forward the
media's case while also advocating the same for the memorandum. A little
more restrategizing and reorganisation on this could accomplish a lot more
than engaging in uncivil disruptions. Diplomacy is never dead, it can fail,
but it can also be revived. There is an opening for a revival to take place
if the media seizes the opportunity.
On Sun, Dec 14, 2008 at 1:35 PM, <dmakali(a)yahoo.com> wrote:
> Theuri
> Very well put. The media has certainly not handled the aftermath well but I
> see it as a reaction to the failure of diplomacy. To be fair, the media did
> quite a bit of that. Top level meetings were held one after another with
> pogisho, ndemo, kalonzo, karua, raila, and twice with rege and his parl
> committee. That's quite an effort.
> Truth is, at this pt, better the bill fell apart, regrettably to the
> detriment of the ict components, and we have the sect 88 intact, than pass a
> new law with all those flaws and inherent danger. Some1 is waiting to latch
> on to that law soon as its assented, to lynch the media.
> Yet I totally appreciate we need some urgent regulation of the broadcast
> sector. But not such crass controls as the bill provides.
> The trouble is that the media can't dedicate too much time to the good
> parts because, well, that won't help to cure the bad! And our suggestion was
> to drop the broadcast parts and have the ict and comm parts sail but
> ministry people don't want that! They want to force it through and the mps
> who have been swearing to tame the media even didn't want to consider the
> minor changes the committee and ministry had proposed. That's malice
> aforethought. That's why this has turned into a free for all betwn
> supporters and opponents of the media.
> Am inclined to think this is a battle the media shouldn't lose in the
> interest of our democracy and civil liberties.
> David
>
> Sent from my BlackBerry(R) wireless device
>
> ------------------------------
> *From*: "Mike Theuri"
> *Date*: Sun, 14 Dec 2008 13:19:01 -0600
> *To*: <dmakali(a)yahoo.com>
>
> *Subject*: Re: [kictanet] [ke-internetusers] Kenya communications
> (amendment)Bill: Is media overacting?
> David,
>
> What happens if the media campaign succeeds, the bill is not signed and
> Parliament fails to override thus killing the bill? Section 88 will remain
> where it is and neither the media nor the public will have gained.
>
> The media could gain some traction by objectively covering the bill in its
> entirety. The media could do well to inform readers of what's new, what's
> positive and what's negative. A well reasoned approach would reveal for
> instance concerns revolving around the appointment of officials to the
> commission or positives such as the bill's approach to e-crimes. The media's
> approach needs to embrace diplomacy and be willing to engage in compromise.
> For instance instead of calling for the deletion of section 88, the media
> could seek common ground and offer among its alternative suggestions to
> deletion, provisions that prevent abuse of section 88.
>
> While the media did not mobilise the masses, the media appears to be
> engaged in what could end up inciting those who have already "self
> mobilised" or are united as a result of food insecurity and related economic
> issues. The media and the public stand to gain nothing by taking advantage
> to fuel a volatile situation.
>
> The media already has painted a bad image of itself, through the actions of
> a few. It is likely that the chief executives of media establishments could
> have sought audience with the President and/or the PM to discuss their
> concerns and made more traction in getting the bill sent back to Parliament
> than have individuals engage in disruptions and heckling. A rational
> approach has a better chance of succeeding than an antagonistic one. The
> media hopefully has that in mind as they plan their next move.
>
> On Sun, Dec 14, 2008 at 8:37 AM, <dmakali(a)yahoo.com> wrote:
>
>> That's not true. You have obviously exaggerated in trying to put across
>> your cheap propaganda. Ndemo was on k24 this morning and he was of course
>> not opposing the bill. Plus, you should ask yourself, who has come out to
>> support the bill and not been given airtime.
>> Yes, the media is campaigning, but it has not yet agreed or employed any
>> of the strategies you have listed. Their time is coming. And we don't need
>> to go to previous regimes to show brutal attacks against the media. The
>> worst have taken place under the current regime!
>> You have more to be grateful than disgusted with the media. Be just a
>> little more reflective and considerate otherwise your diabolical hatred of
>> the media lacks foundation.
>> David
>> Sent from my BlackBerry(R) wireless device
>>
>>
>
1
0
Re: [kictanet] [ke-internetusers] Kenya communications (amendment) Bill: Is media overacting?
by emko@internetresearch.com.gh 14 Dec '08
by emko@internetresearch.com.gh 14 Dec '08
14 Dec '08
Murigi,
I stand correct........
Thanks for the assurance that all is well, really thats what we all want
so we can build our Africa.
Have a goodnight.
Eric here
> Eric,
>
> To the contrary, things are very good in Kenya. Two unrestrained animals
> (parliament and the media) are tying a noose around each others neck.
> Few of us have little sympathy for either side and expect them to tame
> each other.
>
> Murigi
>
> emko(a)internetresearch.com.gh wrote:
>> Good people,
>>
>> At this point, finger pointing does not help and really "two wrongs does
>> not make a right" because tempers are going high and Bill established
>> what
>> i was driving at, things could get back like before and you dont want
>> that.
>>
>> Please lets appeal to the voice of reasoning and apply measures that
>> would
>> retract this track because all you need is like what happened in Greece
>> the other day, a police officer deliberately or not shot a teenager and
>> that country has not known peace.
>>
>> For Kenya, we dont even have the luxury of the Greece situation given
>> the
>> legacy so please i would put my weight behind Bill's proposals below,
>> lets
>> move quickly to calm tempers and defuse the tension.
>>
>> I left Nairobi this morning for Accra and trust me, the atmosphere was
>> not
>> good for my liking.
>>
>> Eric here
>>
>>
>>
>>> Wainaina/Alice et al,
>>>
>>> 1. How can Kictanet help package the following for consumption in the
>>> public
>>> domain??
>>> 2. How can stakeholders in this forum help guide this paradigm
>>> shift...i.e...that there is a different school of thought that cares
>>> about
>>> the rest of the bill and is willing to champion dialogue rather than
>>> fighting the Media??
>>> 3. At Mediacorp, we can support Kictanet with 1/2page space in a
>>> leading
>>> daily (if need be) to pioneer dialogue and consensus building
>>> activities.
>>> We
>>> believe that kictanet can help cool temparatures before our businesses
>>> are
>>> affected for the second time this year.
>>>
>>> Bill
>>>
>>>
>>> On Sun, Dec 14, 2008 at 8:15 PM, Wainaina Mungai
>>> <wainaina(a)madeinkenya.org>
>>> wrote:
>>>
>>>> To add to Alice's point, it is clear the media is determined to
>>>> exclude content that would inform and empower the public...if the said
>>>> content does not serve short-term interests of the media owners. The
>>>> freedom of the media should not be at the expense of public interests.
>>>>
>>>> For instance, it is common knowledge that many objective and
>>>> professional editors find themselves at the mercy of their employers
>>>> whenever a news piece does not favour a friend of the owner. That is
>>>> how we ended up with a media with blood in it's hands during the
>>>> post-election crisis. It's all about the biased reporting the media
>>>> has resorted to in fighting the Bill.
>>>>
>>>> So who should determine the direction and nature of content? An
>>>> independent government regulator or the media owners? Maybe a mix of
>>>> the two would be a step forward...which is what the amendments would
>>>> result in.
>>>>
>>>> If the President passes the Bill, the big change for media would be on
>>>> matters of programming codes. The other big issue of Section 88 is
>>>> neither here nor there because failure by the President to ascent will
>>>> leave us with the same provision under KCA (1998).
>>>>
>>>> Wainaina
>>>>
>>>> On 12/14/08, alice <alice(a)apc.org> wrote:
>>>>
>>>>> David,
>>>>>
>>>>> Perhaps the media could start by reporting accurately. Some of the
>>>>> sections the media find so offensive already exist in the 1998
>>>>> communications act. So why not present the big full picture to all
>>>>> and
>>>>> especially the public?
>>>>>
>>>>>
>>>>> alice
>>>>>
>>>>> (Views expressed are personal and not a reflection of any of the
>>>>> organizations I am affiliated with)
>>>>>
>>>>>
>>>>>
>>>>> dmakali(a)yahoo.com wrote:
>>>>>
>>>>>> Wainaina
>>>>>> I can't argue against your sources but am certain that stage of
>>>>>> black
>>>>>>
>>> out
>>>
>>>>>> for mps hasn't been reached at all. In fact we are meeting tue to
>>>>>>
>>> evaluate
>>>
>>>>>> exactly the import of the passage of that bill and bring every1 on
>>>>>> the
>>>>>> same page.
>>>>>> Of course blacking out not just some 25 mps but all is very much a
>>>>>> possible line of action. And for good reason- these mps did not
>>>>>> consider
>>>>>> ANY of the changes we proposed. That gang approach doesn't lend
>>>>>> itself
>>>>>>
>>> to
>>>
>>>>>> decent engagement frm the media. They have abused their power and
>>>>>>
>>> ignored
>>>
>>>>>> our views, not reasonably but glibly.
>>>>>> I am totally in agrment with thoz who argue the broadcast media
>>>>>> needs
>>>>>> regulation, because it is true. I don't even share some defensive
>>>>>> views
>>>>>> about ownership held by moa- I see no value in nmg getting more
>>>>>> radio
>>>>>> or
>>>>>> tv frequencies for eg coz they already have too many, or royal media
>>>>>> having all thoz frequencies. Its simply obscene. But that is a diff
>>>>>>
>>> story
>>>
>>>>>> frm govt getting into micro management of media conent or , the
>>>>>> minister
>>>>>> having power to raid and confiscate equipment or occupy or take over
>>>>>> a
>>>>>> media house. There was no emergency wen michuki used mercenaries to
>>>>>> raid
>>>>>> standard.
>>>>>> Plus the ethical issues being raised about content can and are
>>>>>> already
>>>>>> addressed under the media act. The worst thing you want is to invite
>>>>>>
>>> govt
>>>
>>>>>> fiat into content matters. You will rue the day you get a
>>>>>> dictatorial
>>>>>> govt. Examples are many.
>>>>>> Similarly, how do you allow the minister to give directions to a
>>>>>> commission that's supposd to be independent? He shud take its advice
>>>>>> not
>>>>>> rubber stamp his decisions. And how do you have a commission
>>>>>> appointed
>>>>>> solely by the minister without any guidelines? Criteria to follow?
>>>>>> Finally did you see the clause about kbc? Nothing about its roles,
>>>>>> and
>>>>>> obligations? Even the principal act is beta!
>>>>>> Well, wainaina and other kictanets, it would be useful to speak to
>>>>>> these
>>>>>> issues even as you condemn the media for obviously lopsided
>>>>>> reporting
>>>>>>
>>> and
>>>
>>>>>> wailing.
>>>>>> David
>>>>>>
>>>>>> Sent from my BlackBerry(R) wireless device
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: "Wainaina Mungai" <wainaina(a)madeinkenya.org>
>>>>>>
>>>>>> Date: Sun, 14 Dec 2008 17:53:55
>>>>>> To: <dmakali(a)yahoo.com>; KICTAnet ICT Policy
>>>>>> Discussions<kictanet(a)lists.kictanet.or.ke>
>>>>>> Subject: Re: [ke-internetusers] Kenya communications (amendment)
>>>>>> Bill:
>>>>>>
>>> Is
>>>
>>>>>> media overacting?
>>>>>>
>>>>>>
>>>>>> David,
>>>>>>
>>>>>> I am very much involved the media and you & I know that it was
>>>>>> agreed
>>>>>> that the Action Plan includes a "blackout to..." as well as all the
>>>>>> issues I indicated.The point is clear. I have told the truth
>>>>>> relating
>>>>>> to the content of the Action Plan.
>>>>>>
>>>>>> The question of execution is separate. Ndemo having been on K24 is
>>>>>> does not change much but it is not in line with the Action
>>>>>> Plan....meaning, we need to complement K24 for that step.
>>>>>>
>>>>>> Let's be honest in our submissions especially concerning such
>>>>>>
>>> revelations.
>>>
>>>>>> Wainaina
>>>>>>
>>>>>> On 12/14/08, dmakali(a)yahoo.com <dmakali(a)yahoo.com> wrote:
>>>>>>
>>>>>>
>>>>>>> That's not true. You have obviously exaggerated in trying to put
>>>>>>> across
>>>>>>> your
>>>>>>> cheap propaganda. Ndemo was on k24 this morning and he was of
>>>>>>> course
>>>>>>>
>>> not
>>>
>>>>>>> opposing the bill. Plus, you should ask yourself, who has come out
>>>>>>> to
>>>>>>> support the bill and not been given airtime.
>>>>>>> Yes, the media is campaigning, but it has not yet agreed or
>>>>>>> employed
>>>>>>>
>>> any
>>>
>>>>>>> of
>>>>>>> the strategies you have listed. Their time is coming. And we don't
>>>>>>>
>>> need
>>>
>>>>>>> to
>>>>>>> go to previous regimes to show brutal attacks against the media.
>>>>>>> The
>>>>>>> worst
>>>>>>> have taken place under the current regime!
>>>>>>> You have more to be grateful than disgusted with the media. Be just
>>>>>>> a
>>>>>>> little
>>>>>>> more reflective and considerate otherwise your diabolical hatred of
>>>>>>> the
>>>>>>> media lacks foundation.
>>>>>>> David
>>>>>>> Sent from my BlackBerry(R) wireless device
>>>>>>>
>>>>>>> -----Original Message-----
>>>>>>> From: "Wainaina Mungai" <wainaina(a)madeinkenya.org>
>>>>>>>
>>>>>>> Date: Sun, 14 Dec 2008 17:08:09
>>>>>>> To: <dmakali(a)yahoo.com>
>>>>>>> Cc: KICTAnet ICT Policy Discussions<kictanet(a)lists.kictanet.or.ke>
>>>>>>> Subject: Re: [kictanet] [ke-internetusers] Kenya communications
>>>>>>> (amendment)
>>>>>>> Bill: Is media overacting?
>>>>>>>
>>>>>>>
>>>>>>> The truth is that the "supporters" you see on TV, hear on radio,
>>>>>>> read
>>>>>>> in papers are not by accident. The Media Owners Association (MoA)
>>>>>>> crafted a campaign strategy that includes the "media blackout to
>>>>>>> all
>>>>>>> MPs who supported the Bill and The Ministry of Information &
>>>>>>> Communications".
>>>>>>>
>>>>>>> According to persons privy to the media campaign strategy, we have
>>>>>>> a
>>>>>>> big problem here and it's about time Kenyans were told the
>>>>>>> objective
>>>>>>> truth. Unfortunately, the people who own the media houses are
>>>>>>> determined to use every possible means to ensure the Bill is not
>>>>>>> signed. You will not hear a supporter of the Bill being given
>>>>>>> coverage.
>>>>>>>
>>>>>>> Why?
>>>>>>>
>>>>>>> The strategy is clearly not intended to yield an objective result.
>>>>>>> The
>>>>>>> intention is to shape public opinion even through biased reporting.
>>>>>>> The strategy includes:
>>>>>>>
>>>>>>> 1. Ensure President dioesn't sign the Bill, by publicly petitioning
>>>>>>>
>>> him.
>>>
>>>>>>> 2. Take advantage of Jamhuri Day to show images of raids conducted
>>>>>>> by
>>>>>>> previous regimes.
>>>>>>> 3. Run a media campaign that includes 'same headline' in all papers
>>>>>>> and similar headlines on electronic media.
>>>>>>> 4. Shape public opinion through campains and show that the Bill is
>>>>>>> unconstitutional...etc etc
>>>>>>> 5. Blackout all supporters of the Bill, Ministry & only invite
>>>>>>> civil
>>>>>>> society players who support the interests of the media. Keep
>>>>>>> watching
>>>>>>> and you'll notice the biased reporting.
>>>>>>> 6. The coverage of the issue in the weekend papers (circulation) is
>>>>>>> also part of the strategy. This will not stop until the President
>>>>>>> yields to the Media's agenda.
>>>>>>>
>>>>>>> The media has the right to petition the President but the problem
>>>>>>> with
>>>>>>> their campaign is that Media Owners have actually agreed not to
>>>>>>> cover
>>>>>>> the issue objectively. They have conspired to shape public opinion
>>>>>>> by
>>>>>>> all possible means including excluding all those who have a
>>>>>>> different
>>>>>>> opinion.
>>>>>>>
>>>>>>> In doing so, they demonstrate the need for legislative regulation.
>>>>>>> The
>>>>>>> nation is now at the mercy of the media and the public will only be
>>>>>>> fed with one side of the story.
>>>>>>>
>>>>>>> Over to you.
>>>>>>> Wainaina
>>>>>>>
>>>>>>>
>>>>>>> On 12/14/08, Kinuthia Muchane <muchanek(a)gmail.com> wrote:
>>>>>>>
>>>>>>>
>>>>>>>> Habari,
>>>>>>>> Maybe the media is overacting, maybe the the MPs are wrong... But
>>>>>>>> one
>>>>>>>> interesting thing about this issue is the timidity of the MPs, to
>>>>>>>>
>>> begin
>>>
>>>>>>>> with, in the news all I am hearing are our dear elected
>>>>>>>>
>>> representatives
>>>
>>>>>>>> vowing their undying support for all sorts of freedom, including
>>>>>>>> that
>>>>>>>>
>>> of
>>>
>>>>>>>> Press, so my question is, isn't there one, single MP who supported
>>>>>>>> passing of the Bill who can come out in defence of his or her
>>>>>>>> stand?
>>>>>>>>
>>> Or
>>>
>>>>>>>> is it because they always pander to the Press, they do not want to
>>>>>>>> be
>>>>>>>> seen in 'bad' light .
>>>>>>>>
>>>>>>>> On the other hand, most of us take what we hear on the radio or
>>>>>>>> watch
>>>>>>>>
>>> on
>>>
>>>>>>>> TV as gospel truth, and the unfortunate fact of life is that the
>>>>>>>> majority of us have no other source of information, or do not
>>>>>>>> seek
>>>>>>>> other
>>>>>>>> avenues of
>>>>>>>> getting information, a fact very well
>>>>>>>> known by members of the so called "Fourth Estate". So when they
>>>>>>>> drench
>>>>>>>> us with "details" about the dangers of the bill's amendment no
>>>>>>>> matter
>>>>>>>> how
>>>>>>>> skewed their
>>>>>>>> opinion is, we will believe them hook, line and sinker!
>>>>>>>> If you ask me, in a country like ours with a very shaky social,
>>>>>>>> political and economic foundation, these merchants of
>>>>>>>> "information" should be very closely and regularly monitored, a
>>>>>>>> Radio
>>>>>>>> Mille Collines can happen here very easily...
>>>>>>>> In any case, ain't all these media 'houses' just commercial
>>>>>>>>
>>> enterprises
>>>
>>>>>>>> out to make a tidy profit?
>>>>>>>>
>>>>>>>> Kinuthia...
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> ke-internetusers mailing list
>>>>>>>> ke-internetusers(a)bdix.net
>>>>>>>> http://www.bdix.net/mailman/listinfo/ke-internetusers
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>> --
>>>>>>> Sent from my mobile device
>>>>>>>
>>>>>>> ---
>>>>>>> http://www.bungesms.com
>>>>>>>
>>>>>>> TWITTER - http://www.twitter.com/bungesms
>>>>>>>
>>>>>>> KABISSA.org -
>>>>>>> http://www.kabissa.org/about/news/member-spotlight-made-kenya-network
>>>>>>>
>>>>>>> KAMPALA Workshop presentation -
>>>>>>>
>>>>>>>
>>> http://m4d.kcl.co.ug/sites/default/files/presentations/BungeSMS_MadeinKenya…
>>>
>>>>>>> _______________________________________________
>>>>>>> kictanet mailing list
>>>>>>> kictanet(a)lists.kictanet.or.ke
>>>>>>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>>>>>>
>>>>>>> This message was sent to: dmakali(a)yahoo.com
>>>>>>> Unsubscribe or change your options at
>>>>>>>
>>>>>>>
>>> http://lists.kictanet.or.ke/mailman/options/kictanet/dmakali%40yahoo.com
>>>
>>>>>>>
>>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> kictanet mailing list
>>>>> kictanet(a)lists.kictanet.or.ke
>>>>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>>>>
>>>>> This message was sent to: wainaina(a)madeinkenya.org
>>>>> Unsubscribe or change your options at
>>>>>
>>>>>
>>> http://lists.kictanet.or.ke/mailman/options/kictanet/wainaina%40madeinkenya…
>>>
>>>> --
>>>> Sent from my mobile device
>>>>
>>>> ---
>>>> http://www.bungesms.com
>>>>
>>>> TWITTER - http://www.twitter.com/bungesms
>>>>
>>>> KABISSA.org -
>>>>
>>> http://www.kabissa.org/about/news/member-spotlight-made-kenya-network
>>>
>>>> KAMPALA Workshop presentation -
>>>>
>>>>
>>> http://m4d.kcl.co.ug/sites/default/files/presentations/BungeSMS_MadeinKenya…
>>>
>>>> _______________________________________________
>>>> kictanet mailing list
>>>> kictanet(a)lists.kictanet.or.ke
>>>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>>>
>>>> This message was sent to: billkagai(a)gmail.com
>>>> Unsubscribe or change your options at
>>>>
>>> http://lists.kictanet.or.ke/mailman/options/kictanet/billkagai%40gmail.com
>>>
>>>
>>> --
>>> Bildad Kagai
>>> MD - MediaCorp Limited
>>> Nairobi Stock Exchange Authorised Information Vendor
>>> Suite B2, Tetu Court, State House Avenue
>>> P. O. Box 20311 - 00200
>>> Nairobi, Kenya
>>> Tel. 254 20 272 8332
>>> Fax. Rendered Obsolete
>>> S - 1°17'13.8"
>>> E - 36°48'22.7"
>>> www.mediacorp.co.ke
>>> ---
>>> _______________________________________________
>>> kictanet mailing list
>>> kictanet(a)lists.kictanet.or.ke
>>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>>
>>> This message was sent to: emko(a)internetresearch.com.gh
>>> Unsubscribe or change your options at
>>> http://lists.kictanet.or.ke/mailman/options/kictanet/emko%40internetresearc…
>>>
>>>
>>
>>
>>
>> _______________________________________________
>> kictanet mailing list
>> kictanet(a)lists.kictanet.or.ke
>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>
>> This message was sent to: murigi.muraya(a)gmail.com
>> Unsubscribe or change your options at
>> http://lists.kictanet.or.ke/mailman/options/kictanet/murigi.muraya%40gmail.…
>>
>>
>
>
1
0
Re: [kictanet] [ke-internetusers] Kenya communications (amendment) Bill: Is media overacting?
by Wainaina Mungai 14 Dec '08
by Wainaina Mungai 14 Dec '08
14 Dec '08
Bw. Ndemo,
Agreed. I have even challenged Editors at one media house to call in
experts to explain the provisions of the Bill.
First, the Media should rise to the "statemanship" they demand of the
rest of us and accept the offer to openly and fairly debate the
issues. They may televise this live on all channels since they have
proved they can easily agree on collective approach.
Secondly, we need to lobby individual media owners to tone down
aspects of their campaign that have degenerated to an abuse of the
national resources delegated to them.
Genuine dialogue will be possible after they put their weapons away
and pursue what is in the longterm interest of Kenya.
Regards
Wainaina
On 12/15/08, bitange(a)jambo.co.ke <bitange(a)jambo.co.ke> wrote:
> Dear Wainaina,
> If Media is as objective as David says, I will avail myself for a debate
> with whoever they select in order to help Kenyans understand these
> amendments.
> We must move from petty arguments to discussing real issues. I want to take
> this opportunity to thank the many jounalists who have expressed solidarity
> with Government to regulate electronic media. Reading through their smss
> and e_mails it is clear that the greatest threat to media freedom are media
> owners.
>
> They rightfully point out that:
> The KCA ammendments is not a media bill as it seeks to introduce electronic
> transactions and broadcast;
> Electronic Media world over is regulated and this is what the bill seeks to
> achieve:
> Noone should be above the law; and
> We must salvage our moral standing by regulating content.
>
> The rightful body that should be raising issues in this saga is the Media
> Council but instead it is the MOA. Just ask yourself what it is that MOA
> has to do with the rights of a journalist?
>
> Ndemo.
>
>
> Sent from my BlackBerry(R)
>
> -----Original Message-----
> From: "Wainaina Mungai" <wainaina(a)madeinkenya.org>
>
> Date: Sun, 14 Dec 2008 17:53:55
> To: <bitange(a)jambo.co.ke>
> Cc: KICTAnet ICT Policy Discussions<kictanet(a)lists.kictanet.or.ke>
> Subject: Re: [kictanet] [ke-internetusers] Kenya communications (amendment)
> Bill: Is media overacting?
>
>
> David,
>
> I am very much involved the media and you & I know that it was agreed
> that the Action Plan includes a "blackout to..." as well as all the
> issues I indicated.The point is clear. I have told the truth relating
> to the content of the Action Plan.
>
> The question of execution is separate. Ndemo having been on K24 is
> does not change much but it is not in line with the Action
> Plan....meaning, we need to complement K24 for that step.
>
> Let's be honest in our submissions especially concerning such revelations.
>
> Wainaina
>
> On 12/14/08, dmakali(a)yahoo.com <dmakali(a)yahoo.com> wrote:
>> That's not true. You have obviously exaggerated in trying to put across
>> your
>> cheap propaganda. Ndemo was on k24 this morning and he was of course not
>> opposing the bill. Plus, you should ask yourself, who has come out to
>> support the bill and not been given airtime.
>> Yes, the media is campaigning, but it has not yet agreed or employed any
>> of
>> the strategies you have listed. Their time is coming. And we don't need
>> to
>> go to previous regimes to show brutal attacks against the media. The
>> worst
>> have taken place under the current regime!
>> You have more to be grateful than disgusted with the media. Be just a
>> little
>> more reflective and considerate otherwise your diabolical hatred of the
>> media lacks foundation.
>> David
>> Sent from my BlackBerry(R) wireless device
>>
>> -----Original Message-----
>> From: "Wainaina Mungai" <wainaina(a)madeinkenya.org>
>>
>> Date: Sun, 14 Dec 2008 17:08:09
>> To: <dmakali(a)yahoo.com>
>> Cc: KICTAnet ICT Policy Discussions<kictanet(a)lists.kictanet.or.ke>
>> Subject: Re: [kictanet] [ke-internetusers] Kenya communications
>> (amendment)
>> Bill: Is media overacting?
>>
>>
>> The truth is that the "supporters" you see on TV, hear on radio, read
>> in papers are not by accident. The Media Owners Association (MoA)
>> crafted a campaign strategy that includes the "media blackout to all
>> MPs who supported the Bill and The Ministry of Information &
>> Communications".
>>
>> According to persons privy to the media campaign strategy, we have a
>> big problem here and it's about time Kenyans were told the objective
>> truth. Unfortunately, the people who own the media houses are
>> determined to use every possible means to ensure the Bill is not
>> signed. You will not hear a supporter of the Bill being given
>> coverage.
>>
>> Why?
>>
>> The strategy is clearly not intended to yield an objective result. The
>> intention is to shape public opinion even through biased reporting.
>> The strategy includes:
>>
>> 1. Ensure President dioesn't sign the Bill, by publicly petitioning him.
>> 2. Take advantage of Jamhuri Day to show images of raids conducted by
>> previous regimes.
>> 3. Run a media campaign that includes 'same headline' in all papers
>> and similar headlines on electronic media.
>> 4. Shape public opinion through campains and show that the Bill is
>> unconstitutional...etc etc
>> 5. Blackout all supporters of the Bill, Ministry & only invite civil
>> society players who support the interests of the media. Keep watching
>> and you'll notice the biased reporting.
>> 6. The coverage of the issue in the weekend papers (circulation) is
>> also part of the strategy. This will not stop until the President
>> yields to the Media's agenda.
>>
>> The media has the right to petition the President but the problem with
>> their campaign is that Media Owners have actually agreed not to cover
>> the issue objectively. They have conspired to shape public opinion by
>> all possible means including excluding all those who have a different
>> opinion.
>>
>> In doing so, they demonstrate the need for legislative regulation. The
>> nation is now at the mercy of the media and the public will only be
>> fed with one side of the story.
>>
>> Over to you.
>> Wainaina
>>
>>
>> On 12/14/08, Kinuthia Muchane <muchanek(a)gmail.com> wrote:
>>> Habari,
>>> Maybe the media is overacting, maybe the the MPs are wrong... But one
>>> interesting thing about this issue is the timidity of the MPs, to begin
>>> with, in the news all I am hearing are our dear elected representatives
>>> vowing their undying support for all sorts of freedom, including that of
>>> Press, so my question is, isn't there one, single MP who supported
>>> passing of the Bill who can come out in defence of his or her stand? Or
>>> is it because they always pander to the Press, they do not want to be
>>> seen in 'bad' light .
>>>
>>> On the other hand, most of us take what we hear on the radio or watch on
>>> TV as gospel truth, and the unfortunate fact of life is that the
>>> majority of us have no other source of information, or do not seek
>>> other
>>> avenues of
>>> getting information, a fact very well
>>> known by members of the so called "Fourth Estate". So when they drench
>>> us with "details" about the dangers of the bill's amendment no matter
>>> how
>>> skewed their
>>> opinion is, we will believe them hook, line and sinker!
>>> If you ask me, in a country like ours with a very shaky social,
>>> political and economic foundation, these merchants of
>>> "information" should be very closely and regularly monitored, a Radio
>>> Mille Collines can happen here very easily...
>>> In any case, ain't all these media 'houses' just commercial enterprises
>>> out to make a tidy profit?
>>>
>>> Kinuthia...
>>>
>>>
>>>
>>> _______________________________________________
>>> ke-internetusers mailing list
>>> ke-internetusers(a)bdix.net
>>> http://www.bdix.net/mailman/listinfo/ke-internetusers
>>>
>>
>> --
>> Sent from my mobile device
>>
>> ---
>> http://www.bungesms.com
>>
>> TWITTER - http://www.twitter.com/bungesms
>>
>> KABISSA.org -
>> http://www.kabissa.org/about/news/member-spotlight-made-kenya-network
>>
>> KAMPALA Workshop presentation -
>> http://m4d.kcl.co.ug/sites/default/files/presentations/BungeSMS_MadeinKenya…
>>
>> _______________________________________________
>> kictanet mailing list
>> kictanet(a)lists.kictanet.or.ke
>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>
>> This message was sent to: dmakali(a)yahoo.com
>> Unsubscribe or change your options at
>> http://lists.kictanet.or.ke/mailman/options/kictanet/dmakali%40yahoo.com
>>
>
> --
> Sent from my mobile device
>
> ---
> http://www.bungesms.com
>
> TWITTER - http://www.twitter.com/bungesms
>
> KABISSA.org -
> http://www.kabissa.org/about/news/member-spotlight-made-kenya-network
>
> KAMPALA Workshop presentation -
> http://m4d.kcl.co.ug/sites/default/files/presentations/BungeSMS_MadeinKenya…
>
> _______________________________________________
> kictanet mailing list
> kictanet(a)lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>
> This message was sent to: bitange(a)jambo.co.ke
> Unsubscribe or change your options at
> http://lists.kictanet.or.ke/mailman/options/kictanet/bitange%40jambo.co.ke
>
> ----------------------------------------------
> This message has been scanned for viruses and
> dangerous content by Jambo MailScanner, and is
> believed to be clean.
> ---------------------------------------------
> "easy access to the world"
>
>
--
Sent from my mobile device
---
http://www.bungesms.com
TWITTER - http://www.twitter.com/bungesms
KABISSA.org - http://www.kabissa.org/about/news/member-spotlight-made-kenya-network
KAMPALA Workshop presentation -
http://m4d.kcl.co.ug/sites/default/files/presentations/BungeSMS_MadeinKenya…
1
0
The price of negligence and incompetence [image:
PDF]<http://www.eastafricapress.net/index2.php?option=com_content&do_pdf=1&id=573>
[image:
Print]<http://www.eastafricapress.net/index2.php?option=com_content&task=view&id=5…>
[image:
E-mail]<http://www.eastafricapress.net/index2.php?option=com_content&task=emailform…>
OUR
VIEW
While the Media Institute condemns the outrageous selfishness exhibited by
Members of Parliament in passing what is clearly a retrogressive law, the
media must not escape culpability for what has befallen it. It has become
norm for the media to cry wolf when faced with any encroachment on its turf,
especially its own welfare.
In fact, in the public domain, the strident wailing of the media has become
all too familiar and sympathy is waning. And why not; there are many sectors
of our society whose cry for attention when their welfare is similarly
threatened by government action or legislation hardly get a fraction of the
interest the media devotes to its own selfish interests. Truth be told, the
media is insensitive and uncaring most of the time.
And it gets worse. The media are not even competent in superintending over
their own matters either because they are out of depth, they cant fathom the
implications of some developments - such as the just enacted Bill - or they
are just consumed by their pursuit of profit and basic competition to
comprehend the threats to their survival or operations. That cannot be said
of the ICT sector, which too is the subject of the same Communications
Amendment Bill 2008, but which has had its issues discussed and thrashed out
in numerous online lists and discussion forums.
Not surprisingly, some media chiefs only came to grips with the implications
of the Bill when it had sailed through the First Reading in Parliament a
month ago. They long left the job of minding the rights enjoyed by the media
almost exclusively to non-governmental organisations that the media cares
less about.
Consider this: A fortnight before the Bill went to the Third and final
phase in the House, an alarmed International Commission of Jurists (Kenya)
called a meeting to sensitize the media about the impending law. And when
they turned up, some of the media chiefs not only knew zilch about the Bill
but what they did after that was even more scandalous. All of them were
unavailable for the action proposed to forestall the passage of the law.
Even when a press conference was called to raise the alarm, all of them were
either busy or conveniently absent.
Rather than mobilize the sector, they retreated to their usual boardrooms
and adopted the ineffective strategy of molly-coddling MPs, ministry of
information officials and other emissaries through informal methods to drop
selective clauses deemed to be threatening to commercial interests
(principally, the prohibition of cross-ownership). The media did not even
give adequate publicity to the Bill prior to the brouhaha, let alone the
other aspects relating to ICT. Needless to say, we failed spectacularly and
now we are back in our regular dark pit of moaning.
What was a clear case of an attempt to abridge freedom of speech was
conveniently couched in terms of commercial interests, protection of
frequencies, turfs, and so forth. The reporting of the aftermath itself has
been terribly wanting. The Communications Bill has all of a sudden become
ICT Bill, Media Bill, and other names we have baptised it. How is the public
to keep track of our lamentations?
In our bid to attract sympathy, ok appeal, to the public, we have also
pressed the sensational button, and the inaccuracies are staggering. For
one, the offending Sect. 88 was not introduced by the new Bill. It is
already in the existing Communications Act and what was on the table was
whether to repeal it. That of course, is clouding issues and confusing the
bigger picture.
At stake is an attempt by the political class to equip itself with the
ammunition to circumscribe the fundamental freedom of expression, and arm
itself with the ammunition to control the media if it is deemed as
unbecoming or threatening to its interests, diverse as they may be. In this
regard one cant help but sympathise with the wing of the coalition that is
always crying about being shortchanged in the power sharing deal - of what
benefit is this new law to the objective of freedom of information in this
country?
Yes, to be candid, the media is far from innocent. Some of the vulgar
content on the airwaves at supposedly neutral hours should not be allowed.
Yes, on their own they have demonstrated utter irresponsibility in setting
standard thanks to the greed for profit. But to sit and wait for government
to legislate their content is perhaps the worst demonstration of lack of
leadership among the media management.
While the Media Institute joins others in appealing to the Head of State to
demonstrate statesmanship and respect for democracy by not assenting to the
law, it must be observed that the media has overspent its goodwill and
earned its just fruits.
Our hope is that the President will not be motivated by short-term parochial
interests to endorse a bad law. The Bill clearly impinges on freedom of
expression and the media, which are democratic principles that he and other
leaders have professed to respect. To turn around and begin to claw back on
that at a time when the country is on the democratic assent and awaits
proper constitutional reform will be both anachronistic and an undeserving
of his legacy.
http://www.eastafricapress.net/index.php?option=com_content&task=view&id=57…
1
0
Re: [kictanet] [ke-internetusers] Kenya communications (amendment) Bill: Is media overacting?
by Mike Theuri 14 Dec '08
by Mike Theuri 14 Dec '08
14 Dec '08
Alex,
The issues that present themselves are multifaceted in nature and cover many
matters.
The protests in question however appeared to cover two areas
1) The KCA Amendment Bill
2) Rising Food Prices and Taxation matters
Mars Group is part of a coalition of numerous groups numbering over 2000
across the
country. Mars Group has been known for exposing matters relating to
governance,
malfeasance and corruption and has in turn transformed itself into a form of
alternative internet based media which is likely to speedily grow if the
traditional print media
reverts to the oppressed position it was in the 90s leading up to 1997.
http://www.marsgroupkenya.org/partnershipforchange/
Mars Group sent out a message on behalf of the "partnership for change" on
Dec 10
which stated in part:
"All our actions are legal and non-violent. We can get the change we want
without heckling or losing self-control. We are in charge of our country
and its destiny. We don't need to heckle or misconduct ourselves if we
are in charge. Change starts with us changing our behaviour and as we
change so too will our country change. Our leaders will follow our lead.
>From now on."
Mars Group's actions were apparently aimed at protesting issue # 2. It is
apparent that
because protesters of both issues were at the same venue, the two issues
became intertwined.
At least one can conclude that Mars Group did not ask those participating to
engage in
disruptive conduct prior to the event.
Has the media been irresponsible? Indeed they have, with media freedom
reaching unprecedented levels. What were once professional media turned
reputable papers into tabloid publications, and some journalists fabricated
stories or accepted brown envelopes to write stories on behalf of interested
parties.
Naturally such occurrences are scattered and there are still a number of
professional members of
the media who uphold journalistic ethics. The industry needs to reign in the
elements who bring
a bad name to the industry. The below provides an insight into some of the
decay in media standards in the country: http://okongospolicy.com/?p=127
Had the industry done a better job at self policing, chances are that they
may have had more support in getting section 88 deleted.
Some sections of the media today are under the control or ownership of
personalities with vested
political interests some of them in elected office today. What Alex has
predicted happening in 2012 will almost certainly take place then and it has
happened in the past before on a smaller scale both politically and for
commercial reasons.
The government is by the people for the people. High handedness in
government and obliviousness to what one's employer is saying is a dangerous
catalyst for chaos when the employer acts out of desperation.
Now the media has become the scapegoat for supposedly mobilising the masses!
Issue #2's seriousness should not be underestimated for what seemingly has
the early makings of a massive movement with economic hardship being the
common denominator. Would the masses adopt the media issue if they were not
vested in issue #2? It would be difficult if not unlikely considering
that it is apparent that the media issue is a relic from the past and what
the media appear to be protesting is its non removal rather than what the
general public believes to be an addition. What is clear is that this
"relic" manifested in section 88 does not have favour with the public and
will soon join the long list of grievances associated with issue #2.
It is said that a hungry man is a angry man, blaming the media for
mobilising the masses when the truth of the matter is that the proponents
(the general public) of issue #2 will adopt any issue that shows
disaffection with those perceived to be in a position to determine whether
one can put food on the table or not, is what one could term as acting
oblivious or what the proverbial ostrich would do were a lion to approach.
Can the 'masses' be calmed downby deleting section 88? Temporarily, yes, but
only until the next feelings of hunger propel issue #2 back to the
forefront.
On Sat, Dec 13, 2008 at 1:53 AM, Alex Gakuru <gakuru(a)gmail.com> wrote:
> Grace,
>
> This is a difficult subject but I guess keeping quiet about it does not
> make it
> go away;) Let me start with an excerpt on recent conversation with a media
> practitioner.
>
> --excerpt--
>
> But a professional journalist cannot accommodate judgmental or
> pre-concluded opinion diagonally opposite to their trade fundamentals
> [for @newbies http://blogs.salon.com/0002007///2003/08/17.html and
> http://jonswift.blogspot.com/2007/11/journalism-101.html ].
>
> After internalising "independence" pretexts when their respective
> coverage were biased towards certain differing quarters, recent
> lessons have now led to our media houses contemplating declaring their
> political ideological alignments (parties or candidates) in future. Do
> not be surprised to find such declarations on TV and radio stations
> or on Newspapers come 2012.
> --excerpt--
>
> On Sat, Dec 13, 2008 at 8:40 AM, Grace Bomu <nmutungu(a)gmail.com> wrote:
> > I had signed up for the mars group protest yesterday on the
> > representation that it was a protest on food prices and MP'S refusal
> > to pay taxes.
> > I am disgusted that the media have used our voices for their causes
> > exclusively, disregarding ours.
>
> What does the Mars Group say about this? Are you likely to participate
> on a similar other initiative under the same circumstances? Do you trust
> our media as mere conduits of information to consumers?
>
> > As a Kenyan, i think there should be a review on cross-ownership of
> > media if democracy is to thrive. Also, considering the role of the
> > media in fueling ethnic/ regional backlash since 2003, isn't there
> > need for a check on them?
>
> Part One:
> Imagine a situation where one 'Private Sector' tycoon owned *all*
> media outlets. His/her network of companies is chasing a lucrative
> government contract. Some Public Procurement and Disposal Act
> law-abiding Civil Servant detects fraudulent practices, collusions,
> etc (and as a reminder these are presently worth 700 billion/year)
> and disqualifies the bid.
>
> The tycoon's network of media outlets decides it's time that Public
> Servant was sacked! Do you think he/she can survive the adverse
> orchestrated negative media coverage? Would the successor be as
> stringent when it came to the bids from the tycoon networks?
>
> Part Two:
> It would be mistaken for anybody to try and defend the media on
> their polarising role towards last years elections and their coverage.
> Clearly, they all had candidates they wanted in power, why?above?
>
> What is "media" is it countable big media houses. Remember they
> are businesses and if something adversely affects their revenue lines
> they will either silently kill it, massage the opinion and expressions
> to conform to (or at least not threaten) their business interests. This
> is what happened to your Mars Group representation?
>
> > There may be misgivings on the arbitraly powers conferred to the
> > Minister in charge of security but media has to be checked.
> > The media should give suggestions on alternative ways to check them
> > instead of using all their airtime and acres of newspapers to win
> > public sympathy.
>
> I am concerned with 'arbitrary powers' implications on expression
> I have not read the new version thus I am speculative here...
>
> The last I heard about this was that it had been agreed to BUT a
> committee (not an individual minister) would make that decision.
> The thinking was that a committee would make a fairer decision.
>
> Imagine a situation where the police were denied powers to raid
> any premises where crimes were ongoing?
>
> > Finally, they should stop branding it ' media bill' as the bill is not
> > a conspiracy against media but a bill to amend the communications act.
> >
>
> Our society amazes on its ways of corrupting things, people, ideas,
> movement, even concepts....
>
> Conclusion:
> If either government or the media were left alone, the public would
> suffer badly.
> Excessive government powers+high handedness plunged us into dictatorships.
> Unchecked media excesses gone wild on "Fourth Estate" public watchdog role
> pursuing purely commercial interests would be a very bad thing for
> democracy.
> Between media and government, consumer interests are better served by the
> media. But recall a recent post to the effect that the internet
> remains consumers
> best saviour? For these reasons, I hope our media away from seeking
> "pity" tries
> "earning" public respect.Only then can we rise up aggressively defending
> media.
>
> In the meantime, kindly email to me the "Blue Copy" for my perusal.
> _______________________________________________
> ke-internetusers mailing list
> ke-internetusers(a)bdix.net
> http://www.bdix.net/mailman/listinfo/ke-internetusers
>
2
1
Today I saw the future of Kenya after the fiber land and I feel duty bound to share the experience.
For many years my business has provided server solutions to multinationals for groupware, our main selling point for having servers located locally was always the unreliable internet links.
Today one of my clients, a multinational company has moved their servers to Europe and are using thin client technology to connect the desktop user.
I saw a similar scenario when multinationals where allowed VSAT terminals, as many technical activities got consolidated either at head office in Europe/USA or regional processing centers in India. What we were left with was clerical and other none core activities. With the downturn in the world financial markets expect more centralised control of corporate activites and offshoring of currently local functions.
I assure the advocates of BSP and call centers that they will achieve their objective of turning Kenya into a clerical hub for the rest of the world. Which is historically what Kenya's role was always meant to be within the British Empire. We are soon to become a nation of overqualified call center operated involved in an activity that does not provide skills transfer.
Come January I will have lost a prime revenue earner as all that will
be expected from us will be blowing the computers and offering 1st
level support on productivity applications and printing issues. This
will mean that I have no need to retain high skilled personnel.
What use is it then for us to be setting up Universities all over the country yet all we shall need are large armies of fellows with good spoken english, maybe french or chinese with an average IQ and basic level of education.
Am I an alarmist? I do not think so I am a realist, I am reengineering to meet the challenge but can someone provide a condusive environment. Ndemo can we get collocation centers made available, the newly redressed ISPs are not about to add value in this direction. Can the government take the lead in outsourcing its activites, we are ready to setup a call centre for the Government in ISIOLO or at RIAT in Kisumu, I dare you to give me the challenge.
Have a god filled christmas & a proserous new year
Robert Yawe
KAY System Technologies Ltd
Phoenix House, 6th Floor
P O Box 55806 Nairobi, 00200
Kenya
Tel: +254722511225, +254202010696
7
7
Thats right, we do and I speak for data.
>
> My sincere apology for the cross posting and am just sharing my
> experience that the situation on network quality in our country is getting
> out of hand. I cannot expect telco CEOs / MDs like the Mr Joseph,
> Mr Saint-Jean or Mr Murray or even from any Network Operators etc to roll up
> their sleeves and go down to their respective Network Centres or Operations
> and reboot caching servers or load balancers!
>
> Network management of data services has reached a point where I'm forced to
> use strong words that either most of kenyan networks are run by people who
> do not undestand them or that there are no quality of service systems in
> place. This is scary given that we hope to provide at least some tiered
> services to a potential audience in the near future. Most technology
> equipment is useless and awaits data entry from skilled operator to turn
> devices into anything meaningful. Are the skilled personell or systems doing
> their jobs? I'd highly recommend to the management of network companies to
> re-evaluate their technologies or even staff and put in place systems that
> allow for real time analysis of their systems and performances. Even a 1%
> packet loss in a modern network is totally unacceptable. Local loop
> latenices must be maintained within 50-200ms and not the 1000-2000ms seen.
> Just one simple question : If it was done right the first time then why keep
> tinkering with it?!
>
> Even if we received some out of the world super submarine fiber, the whole
> process is useless if we cannot maintain/run internal networks to
> international standards. Which leads to a further question : how stable is
> the fiber between Mombasa, Nairobi to kisumu? We need some serious thoughts
> on quality by respective players in the industry so that in future marketing
> as say eg a telecom hub, some investor somewhere does not ask an insulting
> question : how reliable are your networks?
>
> Asante and Happy Jamhuri Day.
>
>
>
>
>
>
>
>
1
0
*Day 4: 6th December 2008*
*Theme: Emerging Issues*
* *
*09:00 - 10:30 Workshop 84: The role and mandate of the IGF*
* *
*Main success of IGF*
- Success of multi-stakeholder forum that provides a informal and
flexible structure for engagement.
- Regional and national meetings such as the Kenya IGF, UK IGF and EAIGF
are creating more opportunities for exchange of information, focus on
development and issues in the governance realm. These meetings should be
fostered.
- Capacity building at an individual and national level
- Sharing of best practices
- Enabled participation on the demand side
- Multilingualism – local language use extends access
- Human rights advocacy– formation of the global network initiative (GNI)
- Formation of the multi-stakeholder advisory group (MAG) that is dynamic
and flexible
- Discussion of issues relating to the environment and sustainability
- Avenue for information sharing between different regions
*Criticisms of the IGF*
· Idea of IGF developed by the civil society – the forum when
established would not issue recommendations or guidelines (not a policy
conference) – consequently maintaining the status quo – this however is not
what the civil society had bargained for.
· The forum has not provided an equal footing of civil society
participants with government and business
· The GNI is not a multi-stakeholder in nature as governments do not
buy into its outputs
· Meaningful change is required in the MAG and secretariat – the MAG
should be more representative and accountable – representatives should be
nominated, while the secretariat should be accountable to the MAG
· The IGF should develop policy proposals as well as briefing
material to facilitators
· The plenary sessions are a waste of time – instead small group
discussions on specific issues should be organised to make policy
proposals/recommendations to the MAG for formalization.
· Recommendations approved by the MAG (which is representative of
all stakeholders)
· There is a need for a re-look of the mandate of the IGF as given
by the Working Group on Internet Governance (WGIG)
· Format of the IGF needs to be changed to increase interactive
between the audience and panel – sitting arrangements should be changed
· Remote participation and documentation needs to be improved
· Need for discussion on cross cutting theme of development
including issues such as
o Migration to digital technologies
o Frequency licensing/frequency policy
o Creating access
· The phrase workshop is a misnomer
· Need for a feedback mechanism
*Challenges*
- Continued support and funding – should be provided by all stakeholders
- Avoid capture by one stakeholder group
- Capacity building for new attendees and creation of advanced sessions
for more experienced participants
*1030 -1300 Diplo Session: IGF'08 Negotiation Simulation*
Facilitated by Ambassador Kishan S Rana and Dr. Jovan Kurbalija
*Importance... *
* *
*Objectives*
Issues of conflict
Common interest
Cannot be solved unilaterally
Commitment to issue
Willingness to compromise
Goal – concede to what you want and
* *
*Concepts*
* *
- *ZOPA* – zone of possible agreement - range within which agreement
possible
- *BATNA*– best alternative to a negotiated agreement – threshold below
which one will not go not worthwhile
- *Win-sets* same as zopa
- *Ripe moment* – in a complex negotiation – time when negotiation can be
concluded – time when there is a meeting of minds –
Negotiations* *implicitly involves trust
*Stages*
- preparation
- negotiation
- pre-negotiation
- follow
*Harvard method principle negotiation *
- project of negotiation power – Harvard university – whole range
of negotiations – Books recommended "Getting to yes: Negotiating Agreement
Without Giving In" by Roger Fisher and William L. Ury and "Getting past
no"
* *
*Four cardinal principles of negotiation *
- separate people from the problem – don't personalize an issue –
build trust – never be caught telling a lie – someone should not push you to
a corner
- behind adversarial position may lie common interest e.g. in the
case of the IGF – building a secure internet
- trying to share pie -only looks to one dimension - search
options – creativity encouraged - common search to secure agreement
- look to criteria that may offer solution
*Meetings and chairmanship*
- preparation – training everyone on how to chair a meeting for
example after the Chec republic Slovakia republic chairman ship of the
European
- every meeting has core group that runs the show – observe the
body language
- observe and identify them
- you want to join that core group gradually
- study body language dynamics listen
- join drafting group learn the rules procedure and how to
manipulate draft
- chair must constantly monitor mood meeting
- chair – authority and tact – should not offend but more move
along
- anticipate problems before they arise observe
- invest in relationships win trust esp of key problems = main
capital gained
- master the show
*Questions/Discussions*
- How do you separate people from the problem? – try create a
relationship through common interest e.g. music – make it clear that you
don't agree – don't take it personality – if you don't agree don't retaliate
personality – junior members of a delegation are invaluable in negotiations
– "float a balloon" – because they don't speak with authority.
- Negotiations largely take place in the corridors and during coffee –
its important to realize when negotiations are a formality – however each
case is unique – realize when you are at the end of the road.
- What happens when there is a stronger party in the negotiation process?
– Weakness and power are in the eye of the beholder – 'sufficient incentive'
–for small country apply leverage in a negotiation – the example of the
treaty between Mauritius and India on Foreign Direct Investment (FDI)
- How are cultural differences managed during negotiations?
- Cultural differences always exist, however negotiations utilise a
common language – English – Translation of negotiations in different
languages may be available – however the English text is considered the
authoritative version/definitive text/principle text.
- It is important to master the English language as an adjunct to your
skills – for example be involved in the drafting group
- There is usually an established common code of conduct during
negotiations.
- Chairmanship is a skill that is learnt – the chair has to be a member
of the group.
* *
*Simulation Exercise on Internet Governance *
Objective – reaching a zone of possible agreement (ZOPA) between the USA,
G77, India, China, Russia, the Business Community and Civil society before
2011 on key IG issues including:
- *The form/name of document *
- Press communiqué
- Chairman's statement
- Declaration of principles
- Code of practice
- Operational declaration
- Framework convention
- Substantive convention
- Formal treaty
- *Net neutrality*
- Single internet
- Mixed system
- Regular internet as public facility
- Private internet
- Multiple internet (no regulation; market driven)
- *Cyber security*
- Bilateral
- G8 framework
- G20 framework
- Regional
- Global
- *Jurisdiction/dispute resolution *
- Regular courts
- Public arbitrations
- Private arbitrations
- *Content policy *
- National
- Regional
- Global
*Main lesson learnt*: it is important to bargain/trade-off in order to reach
the ZOPA otherwise a negotiation that is not concluded could mean a win to
another participant.
*Closing ceremony*
Transcript available at http://igf.wgig.org/cms/index.php/hyderabadprogramme
On 12/10/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>
> *Day 2: 4th December 2008*
>
> * *
>
> *Theme: Promoting Cybersecurity and Trust *
>
> * *
>
> *0930-1100 Panel discussions: Dimensions of Cybersecurity and Cybercrime*
>
> The internet was not originally designed with security features however
> with increased use of the internet security considerations arise.
>
>
>
> It is important to recognize regional, local and cultural issues that may
> affect cyber security and develop a relationship of trust in order to
> develop a framework that determines - what happens in a crisis, how to
> engage in law enforcement. This is important as security issues need to
> be addressed before there is a crisis and should be done at all levels.
>
>
>
> *Computer Emergency Response Team*
>
> * *
>
> The use of the Computer Emergency Response Team (CERT) at a regional and
> national level based on the framework developed by the Carnegie Mellon
> University (www.cert.org) as follows:
>
>
>
> 1. *Organisational *
>
> At an organisational level there should be a person responsible for
> security – the response to security threats need to be formalized – that is
> organizational incident response should be formalized.
>
>
>
> 1. *National*
>
> Formation of national CERT is necessary but not sufficient. Channels for
> relaying of information, mitigating threats need to be organised and tested
> on a regular basis. The national CERT should work with regional CERT as
> well as have links with law enforcement organisations.
>
> There is need for development of a strategy as well as testing of the
> system. Any incidents should be reviewed.
>
>
>
> The goals of CERT should include:
>
> - early detection,
> - short response time,
> - reduction of impact,
> - recognition of liability issues,
> - analysis techniques – which are forensically safe, need to be
> developed in advance not when time is of the essence
> - Alignment of with partners
>
>
>
> ITU-D study group 1 Q 22/1 is studying issues on: *Securing information
> and communication networks: best practices for developing a culture of
> Cybersecurity*
>
>
>
> The security should be implemented without damaging the nature of the
> internet, and protecting vulnerable groups
>
>
>
> *Introduction of cybercrime and terrorism*
>
> Traditional crime has moved online for example harassment and money
> laundering however there are new forms of crime in the virtual world
> including:
>
> - phishing, virus/malware, etc
>
> - Critical infrastructure threats – banking, transport, banking,
> energy, government and national security
>
> - Terrorist use of the internet to publish ideologies, raise
> funds, recruit new members
>
>
>
> The challenges in combating cybercrime and terrorism:
>
> - The crime scene and who is in charge with dealing with the
> threat.
>
> - Relevance of geographic distance
>
> - Investigative cost and the need to carry out real time
> investigations
>
> - Legal framework
>
> - Procedural legal problems
>
> - Complex search and seizure laws
>
> - Responsibility and data
>
> - It complex due to numerous operators involved
>
>
>
> *Questions and discussions*
>
> - Global issue – which needs coordinated effort and cooperation -
> in order to avoid the development of cyber havens.
>
>
>
> - Action, feedback and reaction necessary in order to update
> prevention mechanisms with regard to recent incidents
>
>
>
> - A relationship of trust important between the CERT and ISPs
> –ISPs need to provide data – this should a bottom up process
>
>
>
> - Organisations work in an eco-system –sharing of information –
> collecting statistics before, during and after an incident
>
>
>
> - Access (usage and querying) to the data base at the CERT should
> be controlled – because of privacy issues
>
>
>
> - A mutual Non-Disclosure Agreement (NDA) and formal structures
> should be created through a formal bottom-up process.
>
>
>
> - Network based crime raise issues associated with creating an
> appropriate balance between the needs of those investigating and prosecuting
> and rights and interests.
>
>
>
> - Need for coordination is a challenge to governments because of
> the lack of expertise – therefore have to rely on academia and private
> sector
>
>
>
> - The CERT should be an independent group of experts that should
> be fully empowered
>
>
>
> - Appropriate safeguards to protect the functioning of the
> organisation necessary as they give confidence and ensure business
> continuity during investigation
>
>
>
> - New institutional models based on hybrid frameworks – for
> example Sri-Lanka CERT was set up in June 2006 and involves government as
> well as skilled incident handlers (http://www.slcert.gov.lk/)
>
>
>
> - Need for increased cooperation as cyber crime is
> multi-jurisdiction issue – harmonization of enforcement processes and
> legislation approach such as that of the council of Europe.
>
>
>
> * *
>
> *Indian CERT*
>
> - The internet is used for numerous activities leading to an
> increase cyber attacks consequently there is a need for training on best
> practices and implementation.
>
> - India's legislation includes computer related offences and is
> currently being amended to be in line with the European cyber convention.
>
> - National CERT operates in partnership with Asia and pacific
> CERTs
>
> - The Indian CERT is a government lead industry initiative – that
> aims at creating awareness and compliance to best practices
>
> - Training of law enforcement officers on analysis of computer
> related crime a challenge and undertaken through PPP.
>
> - A secure national cyberspace – requires collaboration, research
> in technologies through a bottom-up process.
>
> - Areas of conflicting interest need to be addressed as
> cybercrime is a global phenomenal – these areas include conflict with
> individual rights, unnecessary censorship and society issues
>
> - Establishment of global alliances essential to ensure stability
> of internet
>
> - Sharing to data about cyber attacks is a challenge
>
> - Establishment of a CERT takes time – needs to include
> participation of private sector partners
>
>
>
> The ITU has identified five pillars with regard to internet security which
> include:
>
>
>
> 1. Legal issues
> 2. Technical procedural issues, Organisational structures including
> CERTs
> 3. Capacity building
> 4. International cooperation
>
>
>
> There is need for proactive approach to provide an early warning system for
> example that used in the event of natural disasters as well as need for
> organisation and cooperation between all stakeholders.
>
>
>
> With regard to initiating internet security measures – start with an issue
> where there is a common understanding for example child protection which was
> the basis of the launch of the child line protection.
>
>
>
> *Capacity building*
>
> *Issues*
>
> - Lack of capacity in of ISPs
>
> - Inter-south cooperation required as challenges and
> infrastructure similar
>
> - Retention of skilled human resources a challenge
>
> - Use of network operator groups for capacity building
>
> - Need to utilize the existing educational framework by
> integration of cybersecurity into curriculum – this creates sustainability
> in capacity building
>
> - Training should be relevant to the environment – appropriate
> use of technology, cost, concentrate on getting the maximum benefit –
> innovation in order to derive the maximum value will be based on training
> received
>
> - Need for collaboration platform – so as to continue sharing
> information
>
> - Need to focus on reality on the ground
>
>
>
> *Kind of training*
>
> - technical training
>
> - policy issues – IPv4/6
>
>
>
> *Technical challenges*
>
> - operators need to be profitable – environment liberalized –
> however still certain monopolized areas – international connectivity –
> imbalanced competition – therefore profitability issue- cant invest in new
> technologies – limited investment in training
>
>
>
> *My comment*: Urgent need create of culture of cybersecurity (end-users,
> at organisation level and nationally) and establishment of national,
> regional CERTs.
>
>
>
> *14:30 - 16:00 Workshop 76 Neutrality Debate Important for You? (Network
> Neutrality Debate: The Implications for Development) *
>
> * *
>
> *Technical issues*
>
> All networks need to be managed
>
>
>
> High broadband connectivity principles
>
> (
> http://www.tiaonline.org/gov_affairs/issues/internet_services_applications/…
> )
>
>
>
> - transparency
>
> - ability to attach any device
>
> - right to access any legal content
>
> - right to download any legal content
>
>
>
> *Economic issues*
>
> Net neutrality has significant micro and macro implications. Broadband
> investment influenced by the broad economic environment because of the
> massive investment required
>
> - Regulation is viewed more beneficial in view of the current
> economic crisis
>
> - More users create value to the platform
>
> - Optimal pricing structure – a possibility - may not want to
> charge content providers to contribute to access
>
> - Mandatory net neutrality/unbundling expected to depress
> investment in broadband plus may have a significant negative effect on
> investment NGN.
>
> - Centre for European Policy Studies – research titled: "I own
> the pipes, you call the tune: The net neutrality debate and its (ir)
> relevance for Europe" available at
> http://shop.ceps.eu/BookDetail.php?item_id=1755 – argues that the internet
> is not neutral – pro-neutrality rules/changes being proposed should be
> evaluated
>
> - The analogy of the roads and vehicles was used to describe net
> neutrality – the roads represent the pipes while the cars represent the
> packets/traffic – which are not regulated and may be of any shape or size.
> However there is regulation with regard to speed.
>
> - issue of convergence – important for users
>
> - internet to drive innovation and economic growth
>
> - activism issues are important to understand the issues
>
> - slowing down the traffic and packets on internet has a
> consequence of slowing down the development internet
>
>
>
> *Issues from a user perspective*
>
> - no consensus on the issues exists
>
> - Users do not necessarily want free/unlimited control – however
> what they want is: what they access should not be controlled
>
> - They do not want to be forced to buy their store brands or
> services of preferred service providers of the broadband connectivity
> provider.
>
> - There is no value in packaging/bundling of services – rather it
> is designed to sell services at a high price
>
> - Users question whether a free market would help as suppliers
> are out to make money – there is an economic motivation to invest – which
> means there is no one to look out for consumers
>
> - Need for establish anti trust/anti monopoly regulations
>
> - ISPs must be made to know that users are not willing to give up
> their rights thus should develop internet usage plans that are favourable to
> the users - suppliers must listen to consumers
>
> - Users have the power to demand what we want if only they
> demanded it
>
> - The investment on the internet should be allowed in all areas –
> core and edges without fragmenting it - networks should be built using open
> interfaces - end to end principle protection is significant
>
> - Users want the internet to encourage innovation
>
> - Use of restaurant analogy where the chairs, tables and food are
> outsourced
>
> - Users should have the ability to have access to the content
> they want as long as it is connected to open interfaces
>
> - Users have concern on the future of the internet; content
> equality and its ability to deliver content in different ways thus
> encouraging local innovation
>
>
>
> *My comment:* significance of net neutrality with reference to developing
> countries was not addressed – taking into consideration that the motivation
> for investment in broadband connectivity is socio-economic development thus
> deployment of both local and international for example submarine cable is
> being done by governments rather than the private sector.
>
>
> On 12/8/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>>
>> *5th December 2008*
>> *930-1100 Panel Discussion Transition from IPv4 to IPv6*
>> Based on several studies it is projected that IPv4 addresses will be
>> globally exhausted by 2011 however address space will still be available at
>> a local level. Seamless take up of IPv6 is expected with the exhaustion of
>> IPv4 and there is on going discussion – to define policy to facilitate
>> smooth transition for operators and ensure that new comers have minimum IPv6
>> address space allocation to start up business.
>>
>> The following issues were discussed from different perspectives:
>>
>> *Issues from operators' perspective*:
>> - Deployment of IPv6 enabled equipment in the core networks should be done
>> increment – however uptake is low because there is no extra revenue
>> generated with the implementation of IPv6 i.e. the lack of commercial
>> drivers. However this is expected to change with the as customer numbers
>> grow.
>>
>> - Need for upgrade – therefore operators from developed countries stand at
>> an advantage as they have the resources and are nearly exhausted their local
>> allocations.
>>
>> - Getting operational experience is a challenge – there is need to invest
>> in operational tools to run IPv6 in terms of software configuration
>> utilities management and trouble shooting
>>
>> - Participation in standardization – where users have equipment that
>> supports only IPv4 – how do they access services that are available only on
>> IPv6-based networks? The IETF is working on the transition mechanisms
>> however the co-existence of both protocols is expected for a long time
>>
>> - Operators are pushing for IPv6 support in customer premise equipment
>> (CPE) as well as software that supports the new protocol version. However it
>> is expected that legacy applications will be available in the foreseeable
>> future
>>
>> *Issues from a vendor perspective*
>> - Transition has been going on for some time in the vendor world. The
>> transition has been a long process for vendors and operators – in terms of
>> getting the technology and standards ready
>>
>> - As IP is the core of the internet – transition to ipv6 – is significant
>> particularly with the increase of IPv6 enabled devices connected to the
>> internet specifically mobile phones
>>
>> - need to understand technology and therefore need for operational and
>> implementation experience
>>
>> - managing customer demand/expectations for IPv6 enabled services and
>> devices
>>
>> - cost of staff training
>>
>> - there are mistakes that will be made – therefore need for mutual support
>> in the implementation of v6
>>
>> *Social and economic perspectives*-
>> - Transition should be cooperative endeavour with social and economic and
>> policy considerations
>>
>> - Gradual implementation and interoperability between IPv4 and v6 expected
>> so as to preserve the investment already made
>>
>> - There is a general understanding that IPv6 will compliment and
>> supplement the existing IPv4 as well as provide improved routing,
>> multicasting, efficient infrastructure. The following questions however
>> arise:
>>
>> o The advantages that IPv6 offer are good reasons to invest in the new IP
>> version.
>> o Would transition be transparent and would backward compatibility
>> required
>>
>> - Users want the stability of the internet to be maintained and hope that
>> IPv6 will offer opportunities for addition to personality features on the
>> internet – this is what makes the business case
>>
>> - In the India case there are a large number of service providers – and
>> there is only a 1/8 usage – therefore demand is low – the need to enhance
>> cultural diversity however provides opportunities to create demand through
>> local content development including E-government programme and Info-tainment
>>
>> - It is important to break the myth that IPv6 is a new internet - It is
>> not a new internet rather continuation of the internet
>>
>> - The main benefit is the address space addition- which may allow for
>> efficiency
>>
>> - There is no need to establish a deadline or regulate the implementation
>> of IPv6 – as it will be market driven. Additionally users should have rights
>> to use IPv4 and IETF is working on coexistence
>>
>> *Policy perspective*
>> - With the impending exhaustion of IPv4 – further implementation will be
>> problematic – as not all players will support transition therefore it is
>> important to examine measures – for continued use of IPv4 and possible
>> migration of users to private IPv4 address space
>>
>> - creation of action plan to be implemented by 2010 – for example offering
>> of incentives such as tax exemption and capacity building
>>
>> - examination of existing programmes and mechanisms
>>
>> - establishment of taskforce of IPv4 exhaustion
>>
>> - the messages of ISPs is that they must carry IPv6
>>
>> - IPv4 scarcity and demand for more security are the 2 major challenges
>> driving the uptake of IPv6
>>
>> - Institution of market transfer or reclamation mechanisms of IPv4
>> resources not required by local internet registries to the regional internet
>> registries when transition to IPv6 is implemented. However this would be a
>> challenge as RIRs have no contractual authority this may create a grey
>> market. This challenge may be overcome through a loose membership
>> association that allows others to use others resources
>>
>> - Institution of secure routing objects including PKI to authenticate
>> users raises governance/control issues – RIRs have centralized control which
>> may make it efficient and better able to address security issues this makes
>> an RIR an central governance institution. Membership of security/government
>> associations in the RIR would result in infiltration of technical, policy
>> agendas that may make the transition to IPv6 complicated
>>
>> - However it is argued that RIRs should remain neutral and trans-national
>> institutions which:
>> o maintain a homogenous technical group
>> o maintain a bottom-up approach in policy making
>> o guarantee the stability of the internet and business continuity of
>> members
>>
>> - main challenges in the deployment of IPv6 include:
>> o lack of public education, information and skill
>> o limited network policy decisions to make deployment happen
>> o lack of incentive to deploy ipv6
>>
>> *1100-1230 Workshop 59:Building a global capacity building curriculum
>> framework and premier*
>>
>> - Integration of IG capacity building in existing ICT and public policy
>> courses was advocated.
>>
>> - The training may be offered either online, offline or through short term
>> executive courses.
>>
>> - Collaboration between different stakeholders who have different needs is
>> imperative in order create an understanding of the issues arising from
>> increased used of the internet particularly those that transcend the
>> geographical, and cultural borders.
>>
>> - internet security awareness programme set up in India
>>
>> - Presentations on the Diplo IG capacity building programme (
>> www.diplomacy.edu/ig) – including a demonstration of the online platform.
>>
>> - The Diplo approach includes the training course (foundation and
>> advanced), policy research, policy immersion and community interaction.
>>
>> - The impact associated with the IG capacity building programme have been
>> varied and impressive including the establishment of IG governance masters
>> programme in Srilanka and the use of telecentres to disseminate IG related
>> information.
>>
>> - Diplo has successfully offered the training to professional worldwide
>> for the last 4 years leading to the establishment of national, regional and
>> global community
>>
>> *1400-1530 Workshop 29: Building confidence and security in the use and
>> security in the use of ICTs for African countries
>>
>> *Main challenges in Africa
>> - lack of infrastructure
>> - lack of services
>>
>> Therefore opportunity to learn from mistakes in developing countries and
>> establish of computer emergency response team currently there is only one
>> active CERT in Africa in Tunisia, South Africa is in the process of setting
>> up a CERT with the deadline of 2010 before the FIFA world cup. While
>> countries such as Morocco, Kenya and Ivory Coast are thinking about set in
>> up CERTs.
>>
>> The approach in dealing with Cybersecurity in developing countries
>>
>> Success of Cybersecurity is based on 3pillars
>>
>> 1. *Technology pillar* – ICT/security tools –including:
>> o PCs / networks, physical security tools, data tools (storage media and
>> cryptography), availability of infrastructure and application (redundant
>> servers and PKI)
>>
>> 2. *Methodology pillar* – policy, procedures and regulations on three
>> levels:
>> o managerial level (security policy, management procedures and capacity
>> building, audit) Legislative level (law and regulation)
>> o operational level (acces control rules, implementation plans,
>> monitoring, watch, incidence handling)
>> o continuity of services level ( business continuity plan, crisis
>> management, drill exercises)
>> - actors in this pillar include the government, security professionals and
>> users
>>
>> 3. *Social behaviour pillar* – creating a culture of cyber security
>> o cultivate culture of cyber security through continuous action of raising
>> awareness using diverse media/channels
>> o the target audience includes managers, decision makers, security,
>> children, parents, teachers
>>
>>
>> *Case study: CERT-TCC - Tunisia*
>>
>> *The functions of the CERT include*:
>>
>> - Watch- collect information from different sources eg CISCO, HP.
>> Microsoft, network of CERTs, community of hackers
>> - Training
>> - Coordination
>> - Response
>> - Incidence handling
>> - Incident analysis
>> - Awareness
>> - Warning alert
>>
>> *Key issues*:
>>
>> • Information, warning and alert – carried out to in collaboration with
>> ISPs, managers decision makers, internet community through mailing list,
>> call centre, media
>>
>> • Oriented campaign – utilizing prospectus, posters, email, radio,
>> cartoons, video, attack simulation and guides
>>
>> • Incident handling - training in new tools
>>
>> • Coordination important in the effective functioning of the CERT –
>> incident coordination procedures and information including regional CERTs,
>> other CERTs within the country (for example Brazil has more than one CERT),
>> ISPs and operators, vendors and integrators, and national authorities.
>>
>> Need for the formation of CERTs in Africa however the challenges of lack
>> of "know how" in IT security need to be overcome through:
>> - capacity building
>> - encouragement of the development of national solutions based on open
>> source components
>> - improved R&D capabilities and making it more responsive to urgent needs
>> - encouraging academic research in the important topics of security
>> (cryptography, methodologies…)
>>
>> *The following questions and comments were raised*:
>>
>> - the need for social engineering through the creation of a culture of
>> cyber security to be addressed specifically because of the increased
>> requirements by government to obligate to provide subscriber identification
>> information
>>
>> - how can African countries start up a cert- through collaboration for
>> example with existing CERTs
>>
>> - in establishing a culture of cybersecurity – consideration should be
>> given to the fact that there are different social cultures in different
>> countries however there is consensus on issues such as child pornography,
>> identity theft
>>
>> - how can a regional approach be developed where there are differences in
>> level of ICT infrastructure and use of infrastructure in the delivery of
>> services, what tools can be used to encourage decision makers to be involved
>> in the issues of cyber security?
>>
>> o It was recognised that funding and expertise was required for example
>> AFDB, World Bank and Islamic Bank while ITU have regional workshops on cyber
>> security
>>
>> o As African countries build on infrastructure and services – there is an
>> opportunity to learn from those that have already developed CERTs.
>>
>> - How does the CERT monitor traffic: with the collaboration of ISP and
>> operators as well as supporting legislation
>>
>> - Regulators need to advice the government to use ICT in development –
>> this is a manifestation of government commitment
>>
>> - The role of policy making was emphasized – as it provides government
>> commitment to using ICT for social economic development and governance and
>> consequently support for cyber security initiatives – including the
>> formulation of legislation.
>>
>> - There should not use a piece meal approach to cyber security to prevent
>> ineffectiveness for example Mauritius has electronic transaction act but PKI
>> not yet established
>>
>>
>>
>> On 12/5/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>>>
>>> Following our recent online discussions on Internet governance issues in
>>> Kenya, the Kenya IGF and East African IGF; you may wish to follow the
>>> discussion currently ongoing at the global IGF 2008 in Hyderabad India at
>>> http://www.intgovforum.org.
>>>
>>> Below are highlights from workshops I attended on Day 1 December 3rd):
>>> *0930-1100 hrs Workshop 43: Legal aspects of governance critical
>>> internet Policy issues of public relevance*
>>> *1st presentation*
>>> The issues on that have legal implications include:
>>> • internet security intellectual property rights, infringement, privacy
>>> and protection mechanisms
>>> • IP domain name protection, conflicts arising out of data and content
>>> ownership privacy therefore increasing role of P2P in growth of internet 2
>>> • Consumer status and rights in relation to e-commerce cross border and
>>> domestic online trade
>>> • Telecom issue viz backbone deployment and interconnection costs
>>> • Freedom of expression – the extent of censorship and control on online
>>> content
>>>
>>> There is need for capacity building to create meaningful participation of
>>> individual and SMEs as well as increasing connectivity through building IXPs
>>> and local content development
>>>
>>> The question was raised as to whether there a need of alternative
>>> institutional mechanism.
>>> The salient features of the MOU between ICANN and the department of
>>> commerce (DoC) include:
>>> - The affirmation of the role of private sector leadership
>>> - The role of DoC in ensuring transparency and accountability and
>>> effective GAC participation
>>> - Ensure accountability and publish by-laws and strategic and operational
>>> plans
>>> - Agreement can be terminated in 120 days
>>>
>>> The MOU has been criticized because of the following reasons:
>>> - US governmental control on root server administration
>>> - Inconsistent with WSIS principle where no single government should have
>>> a pre-eminent role
>>> - Domain name allocation policies need better development
>>> - IPv4 address allocation have been imbalanced need to ensure IPv6
>>> address allocation does not suffer the same effects -This assertion was
>>> however refuted as IP addresses allocation based on need. The need for
>>> prudent management and keeping barriers low for the transition to IPv6 was
>>> emphasised.
>>>
>>> To overcome this WGIG proposed 4 models:
>>> - Global policy council
>>> - Intenational internet council with leading government role to fulfil
>>> the ICANN/IANA functions
>>> - GAC to be strengthened with enhanced coordination function
>>> - Replace US govt role by general internet council or with world ICANN
>>> (in lieu of GAC)
>>>
>>> The common features of these models were the overwhelming government lead
>>> and the presupposition of the possibility of international treaties. During
>>> the discussion the viability of these models was questioned given that speed
>>> is of essence in the management of internet resources. It normally takes a
>>> long time to negotiate international agreements; including treaties instead
>>> a set of principles should be endorsed.
>>>
>>> The speaker recommended on the management of critical internet
>>> infrastructure should take into consideration the following
>>> • Treatment of technical resources of the internet and global economic,
>>> social and legal aspects arising out the internet should be at par
>>> • The development and implementation of polices and standards and
>>> solutions to various internet issues should be done in a coordinated manner
>>> for example telecommunication standard development is done in a hierarchical
>>> and predictable way.
>>> • New structure would be a supreme authority over internet
>>>
>>> In conclusion the speaker asked: Does the internet as we know it need to
>>> be altered radically? Should the status quo be maintained? Should a Red
>>> Cross model of recognition by international community states be given to an
>>> international entity like ITU, INTELSAT. However fundamental change is not
>>> necessary as failure has not been identified.
>>>
>>> *My comment*: this presentation was descriptive and despite the fact
>>> that an alternative model was proposed the principles, mechanisms that would
>>> need to be put in place in order to make it work were not discussed
>>>
>>> *2nd presentation*
>>> The next speaker spoke about the ccTLDs in latin Amercia which are
>>> broadly organised into two main groups: non-governmental and governmental
>>> organisations. A contribution from the floor however clarified that the
>>> Brazilian ccTLD is a multi-stakeholder – coordinated by government – but on
>>> a day by day basis operates as a non-governmental organisation. The Indian
>>> ccTLD is managed by government and private sector – sovereign interest taken
>>> care of through government representation.
>>>
>>> The rules and regulations under which the institutions that manage the
>>> ccTLDs are managed determinate legal framework under which they operate.
>>> Consequently ccTLDs are regulated under national law while ICANN regulates
>>> gTLDs – The possibility of self regulation is based on the assumption that
>>> private sector would act in the public interest.
>>>
>>> In the discussions some felt that there was need for increased attention
>>> of government in the management of ccTLDs – as it was critical
>>> infrastructure while on the other hand other felt that there was the risk of
>>> excessive regulation with increased involvement of government.
>>>
>>> *1130 -1200 hrs Workshop 36: Strategies to prevent and fight child
>>> pornography in developing countries*
>>> Child pornography in Brazil has grown out of the popularity of social
>>> networking. However the main challenge has been issues related to
>>> jurisdiction as content is resident in ISP based in the USA and
>>> trans-national ISPs like Yahoo, Microsoft and Google which have branches in
>>> strategic markets and have tailored the services for these markets in terms
>>> of language and content.
>>>
>>> Brazil was therefore unable to deal with serious offences related to
>>> content – specifically child pornography - committed by Brazilians using
>>> Brazilian IP addresses. The government has been able to sign an agreement
>>> with Google to fight child pornography on Google's orkut social network.
>>>
>>> The following are consideration taken in drawing up the agreement
>>> 1. Which criteria should be used to define the ability of a particular
>>> country to legislate over and sanction conducts committed on the internet?
>>> - Where the data is located?
>>> - International law principles (territoriality or nationality) shall be
>>> used to define the sovereignty of a state regarding – cyber space – which is
>>> a network of networks
>>> - Define some reasonable standard – for example managed by Brazilians and
>>> is local content and local language
>>> - Access points in Brazil, harmful conduct felt in the country – taken
>>> obligation under international law to take offence – country of origin
>>> approach would force thousands of users to unfamiliar rules and travel –
>>> offence under human rights therefore apply local legislation
>>>
>>> 2. It is legitimate to enforce the conduct of local office –as it
>>> impracticable to send legal request to the US.
>>>
>>>
>>> New tools have been implement that have reduced number of images uploaded
>>> and increase in number of reported cases- subject to investigation. It was
>>> inspiring to listen to parliamentarian talk about the need to have
>>> legislators engaged in the process as they ultimately pass the laws. I
>>> appreciated the fact that in there is great cooperation between the
>>> parliament, government, police, civil society and private sector.
>>>
>>> The main challenges are:
>>> • Lack of awareness and participation by parliamentarians who are
>>> critical in the formulation of legislation
>>> • how to obligate ISPs to provide information without infringing on
>>> freedom of expression and privacy,
>>> • what criteria should be used to deal with these offences
>>> • the creation of awareness of ISPs in developing countries of the need
>>> for judicial cooperation as well as social initiatives to deal with cyber
>>> crime.
>>> • Insufficient infrastructure to deal with this issue – law enforcement
>>> does not have the human resources and technology
>>> • Material produced to fight child pornography are not evaluated – they
>>> should be inline with the demand
>>>
>>> *My comment*: I would have like to know if initiatives have reduced
>>> offences, what is the success rate registered in prosecution, ability of the
>>> law enforcement and judicial system to deal with offences. There was no
>>> mention of where initiatives had been launched to fight child pornography on
>>> the financial front.
>>>
>>>
>>> *1530-1700 Workshop 45: Opening to diversity and competition of the DNS
>>> system*
>>>
>>>
>>>
>>> There were 3 presentations in this session:
>>>
>>>
>>> - *1st presentation* - alternate DNS system used in library systems
>>>
>>>
>>> - *2nd presentation* - implementation of security in the Handle system
>>>
>>>
>>> - *3rd presentation –* discussed the Net4D
>>>
>>>
>>>
>>> Net4D- provides the technical solution to the political concern on the
>>> control of root servers. Net4D networks enable the following:
>>>
>>> • Empower the second generation of the web: the semantic web.
>>>
>>> • Multi-stakeholder governance of DNS
>>>
>>> • Net4D classes should be open and interoperable
>>>
>>> DNS 1.0 – was a monopoly of ICANN web 1.0 html with USA parentage and
>>> English only while DNS 2.0 is open allowing for competition including inter
>>> alia:
>>>
>>> • Net4D semantic web
>>>
>>> • Open coherent approach to linguistic diversity
>>>
>>> • Allow technological innovation with value added services
>>>
>>>
>>>
>>> Concern was however raised on the:
>>>
>>> • Investment/implementation cost required to implementation of different
>>> DNS systems depending on the BIND implemented and root servers enabled
>>>
>>> • relinquishing of the political control of root servers
>>>
>>> • Value to end users
>>>
>>> • Awareness and understanding of the issues by different stakeholders
>>> necessary – delivered in a way that they can understand
>>>
>>>
>>>
>>> *My comment*: the session was technical – I hope the techies on the
>>> mailing list can help us understand the governance issues associated with
>>> the introduction of DNS competition and the impact on developing countries
>>> :)!
>>>
>>>
>>>
>>> Kind regards
>>>
>>> mwende
>>>
>>
>>
>
1
0
*Day 2: 4th December 2008*
* *
*Theme: Promoting Cybersecurity and Trust *
* *
*0930-1100 Panel discussions: Dimensions of Cybersecurity and Cybercrime*
The internet was not originally designed with security features however with
increased use of the internet security considerations arise.
It is important to recognize regional, local and cultural issues that may
affect cyber security and develop a relationship of trust in order to
develop a framework that determines - what happens in a crisis, how to
engage in law enforcement. This is important as security issues need to be
addressed before there is a crisis and should be done at all levels.
*Computer Emergency Response Team*
* *
The use of the Computer Emergency Response Team (CERT) at a regional and
national level based on the framework developed by the Carnegie Mellon
University (www.cert.org) as follows:
1. *Organisational *
At an organisational level there should be a person responsible for security
– the response to security threats need to be formalized – that is
organizational incident response should be formalized.
1. *National*
Formation of national CERT is necessary but not sufficient. Channels for
relaying of information, mitigating threats need to be organised and tested
on a regular basis. The national CERT should work with regional CERT as
well as have links with law enforcement organisations.
There is need for development of a strategy as well as testing of the
system. Any incidents should be reviewed.
The goals of CERT should include:
- early detection,
- short response time,
- reduction of impact,
- recognition of liability issues,
- analysis techniques – which are forensically safe, need to be developed
in advance not when time is of the essence
- Alignment of with partners
ITU-D study group 1 Q 22/1 is studying issues on: *Securing information and
communication networks: best practices for developing a culture of
Cybersecurity*
The security should be implemented without damaging the nature of the
internet, and protecting vulnerable groups
*Introduction of cybercrime and terrorism*
Traditional crime has moved online for example harassment and money
laundering however there are new forms of crime in the virtual world
including:
- phishing, virus/malware, etc
- Critical infrastructure threats – banking, transport, banking,
energy, government and national security
- Terrorist use of the internet to publish ideologies, raise funds,
recruit new members
The challenges in combating cybercrime and terrorism:
- The crime scene and who is in charge with dealing with the
threat.
- Relevance of geographic distance
- Investigative cost and the need to carry out real time
investigations
- Legal framework
- Procedural legal problems
- Complex search and seizure laws
- Responsibility and data
- It complex due to numerous operators involved
*Questions and discussions*
- Global issue – which needs coordinated effort and cooperation -
in order to avoid the development of cyber havens.
- Action, feedback and reaction necessary in order to update
prevention mechanisms with regard to recent incidents
- A relationship of trust important between the CERT and ISPs –ISPs
need to provide data – this should a bottom up process
- Organisations work in an eco-system –sharing of information –
collecting statistics before, during and after an incident
- Access (usage and querying) to the data base at the CERT should
be controlled – because of privacy issues
- A mutual Non-Disclosure Agreement (NDA) and formal structures
should be created through a formal bottom-up process.
- Network based crime raise issues associated with creating an
appropriate balance between the needs of those investigating and prosecuting
and rights and interests.
- Need for coordination is a challenge to governments because of
the lack of expertise – therefore have to rely on academia and private
sector
- The CERT should be an independent group of experts that should be
fully empowered
- Appropriate safeguards to protect the functioning of the
organisation necessary as they give confidence and ensure business
continuity during investigation
- New institutional models based on hybrid frameworks – for example
Sri-Lanka CERT was set up in June 2006 and involves government as well as
skilled incident handlers (http://www.slcert.gov.lk/)
- Need for increased cooperation as cyber crime is
multi-jurisdiction issue – harmonization of enforcement processes and
legislation approach such as that of the council of Europe.
* *
*Indian CERT*
- The internet is used for numerous activities leading to an
increase cyber attacks consequently there is a need for training on best
practices and implementation.
- India's legislation includes computer related offences and is
currently being amended to be in line with the European cyber convention.
- National CERT operates in partnership with Asia and pacific CERTs
- The Indian CERT is a government lead industry initiative – that
aims at creating awareness and compliance to best practices
- Training of law enforcement officers on analysis of computer
related crime a challenge and undertaken through PPP.
- A secure national cyberspace – requires collaboration, research
in technologies through a bottom-up process.
- Areas of conflicting interest need to be addressed as cybercrime
is a global phenomenal – these areas include conflict with individual
rights, unnecessary censorship and society issues
- Establishment of global alliances essential to ensure stability
of internet
- Sharing to data about cyber attacks is a challenge
- Establishment of a CERT takes time – needs to include
participation of private sector partners
The ITU has identified five pillars with regard to internet security which
include:
1. Legal issues
2. Technical procedural issues, Organisational structures including
CERTs
3. Capacity building
4. International cooperation
There is need for proactive approach to provide an early warning system for
example that used in the event of natural disasters as well as need for
organisation and cooperation between all stakeholders.
With regard to initiating internet security measures – start with an issue
where there is a common understanding for example child protection which was
the basis of the launch of the child line protection.
*Capacity building*
*Issues*
- Lack of capacity in of ISPs
- Inter-south cooperation required as challenges and infrastructure
similar
- Retention of skilled human resources a challenge
- Use of network operator groups for capacity building
- Need to utilize the existing educational framework by integration
of cybersecurity into curriculum – this creates sustainability in capacity
building
- Training should be relevant to the environment – appropriate use
of technology, cost, concentrate on getting the maximum benefit – innovation
in order to derive the maximum value will be based on training received
- Need for collaboration platform – so as to continue sharing
information
- Need to focus on reality on the ground
*Kind of training*
- technical training
- policy issues – IPv4/6
*Technical challenges*
- operators need to be profitable – environment liberalized –
however still certain monopolized areas – international connectivity –
imbalanced competition – therefore profitability issue- cant invest in new
technologies – limited investment in training
*My comment*: Urgent need create of culture of cybersecurity (end-users, at
organisation level and nationally) and establishment of national, regional
CERTs.
*14:30 - 16:00 Workshop 76 Neutrality Debate Important for You? (Network
Neutrality Debate: The Implications for Development) *
* *
*Technical issues*
All networks need to be managed
High broadband connectivity principles
(
http://www.tiaonline.org/gov_affairs/issues/internet_services_applications/…
)
- transparency
- ability to attach any device
- right to access any legal content
- right to download any legal content
*Economic issues*
Net neutrality has significant micro and macro implications. Broadband
investment influenced by the broad economic environment because of the
massive investment required
- Regulation is viewed more beneficial in view of the current
economic crisis
- More users create value to the platform
- Optimal pricing structure – a possibility - may not want to
charge content providers to contribute to access
- Mandatory net neutrality/unbundling expected to depress
investment in broadband plus may have a significant negative effect on
investment NGN.
- Centre for European Policy Studies – research titled: "I own the
pipes, you call the tune: The net neutrality debate and its (ir) relevance
for Europe" available at http://shop.ceps.eu/BookDetail.php?item_id=1755 –
argues that the internet is not neutral – pro-neutrality rules/changes being
proposed should be evaluated
- The analogy of the roads and vehicles was used to describe net
neutrality – the roads represent the pipes while the cars represent the
packets/traffic – which are not regulated and may be of any shape or
size. However
there is regulation with regard to speed.
- issue of convergence – important for users
- internet to drive innovation and economic growth
- activism issues are important to understand the issues
- slowing down the traffic and packets on internet has a
consequence of slowing down the development internet
*Issues from a user perspective*
- no consensus on the issues exists
- Users do not necessarily want free/unlimited control – however
what they want is: what they access should not be controlled
- They do not want to be forced to buy their store brands or
services of preferred service providers of the broadband connectivity
provider.
- There is no value in packaging/bundling of services – rather it
is designed to sell services at a high price
- Users question whether a free market would help as suppliers are
out to make money – there is an economic motivation to invest – which means
there is no one to look out for consumers
- Need for establish anti trust/anti monopoly regulations
- ISPs must be made to know that users are not willing to give up
their rights thus should develop internet usage plans that are favourable to
the users - suppliers must listen to consumers
- Users have the power to demand what we want if only they demanded
it
- The investment on the internet should be allowed in all areas –
core and edges without fragmenting it - networks should be built using open
interfaces - end to end principle protection is significant
- Users want the internet to encourage innovation
- Use of restaurant analogy where the chairs, tables and food are
outsourced
- Users should have the ability to have access to the content they
want as long as it is connected to open interfaces
- Users have concern on the future of the internet; content
equality and its ability to deliver content in different ways thus
encouraging local innovation
*My comment:* significance of net neutrality with reference to developing
countries was not addressed – taking into consideration that the motivation
for investment in broadband connectivity is socio-economic development thus
deployment of both local and international for example submarine cable is
being done by governments rather than the private sector.
On 12/8/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>
> *5th December 2008*
> *930-1100 Panel Discussion Transition from IPv4 to IPv6*
> Based on several studies it is projected that IPv4 addresses will be
> globally exhausted by 2011 however address space will still be available at
> a local level. Seamless take up of IPv6 is expected with the exhaustion of
> IPv4 and there is on going discussion – to define policy to facilitate
> smooth transition for operators and ensure that new comers have minimum IPv6
> address space allocation to start up business.
>
> The following issues were discussed from different perspectives:
>
> *Issues from operators' perspective*:
> - Deployment of IPv6 enabled equipment in the core networks should be done
> increment – however uptake is low because there is no extra revenue
> generated with the implementation of IPv6 i.e. the lack of commercial
> drivers. However this is expected to change with the as customer numbers
> grow.
>
> - Need for upgrade – therefore operators from developed countries stand at
> an advantage as they have the resources and are nearly exhausted their local
> allocations.
>
> - Getting operational experience is a challenge – there is need to invest
> in operational tools to run IPv6 in terms of software configuration
> utilities management and trouble shooting
>
> - Participation in standardization – where users have equipment that
> supports only IPv4 – how do they access services that are available only on
> IPv6-based networks? The IETF is working on the transition mechanisms
> however the co-existence of both protocols is expected for a long time
>
> - Operators are pushing for IPv6 support in customer premise equipment
> (CPE) as well as software that supports the new protocol version. However it
> is expected that legacy applications will be available in the foreseeable
> future
>
> *Issues from a vendor perspective*
> - Transition has been going on for some time in the vendor world. The
> transition has been a long process for vendors and operators – in terms of
> getting the technology and standards ready
>
> - As IP is the core of the internet – transition to ipv6 – is significant
> particularly with the increase of IPv6 enabled devices connected to the
> internet specifically mobile phones
>
> - need to understand technology and therefore need for operational and
> implementation experience
>
> - managing customer demand/expectations for IPv6 enabled services and
> devices
>
> - cost of staff training
>
> - there are mistakes that will be made – therefore need for mutual support
> in the implementation of v6
>
> *Social and economic perspectives*-
> - Transition should be cooperative endeavour with social and economic and
> policy considerations
>
> - Gradual implementation and interoperability between IPv4 and v6 expected
> so as to preserve the investment already made
>
> - There is a general understanding that IPv6 will compliment and supplement
> the existing IPv4 as well as provide improved routing, multicasting,
> efficient infrastructure. The following questions however arise:
>
> o The advantages that IPv6 offer are good reasons to invest in the new IP
> version.
> o Would transition be transparent and would backward compatibility required
>
> - Users want the stability of the internet to be maintained and hope that
> IPv6 will offer opportunities for addition to personality features on the
> internet – this is what makes the business case
>
> - In the India case there are a large number of service providers – and
> there is only a 1/8 usage – therefore demand is low – the need to enhance
> cultural diversity however provides opportunities to create demand through
> local content development including E-government programme and Info-tainment
>
> - It is important to break the myth that IPv6 is a new internet - It is not
> a new internet rather continuation of the internet
>
> - The main benefit is the address space addition- which may allow for
> efficiency
>
> - There is no need to establish a deadline or regulate the implementation
> of IPv6 – as it will be market driven. Additionally users should have rights
> to use IPv4 and IETF is working on coexistence
>
> *Policy perspective*
> - With the impending exhaustion of IPv4 – further implementation will be
> problematic – as not all players will support transition therefore it is
> important to examine measures – for continued use of IPv4 and possible
> migration of users to private IPv4 address space
>
> - creation of action plan to be implemented by 2010 – for example offering
> of incentives such as tax exemption and capacity building
>
> - examination of existing programmes and mechanisms
>
> - establishment of taskforce of IPv4 exhaustion
>
> - the messages of ISPs is that they must carry IPv6
>
> - IPv4 scarcity and demand for more security are the 2 major challenges
> driving the uptake of IPv6
>
> - Institution of market transfer or reclamation mechanisms of IPv4
> resources not required by local internet registries to the regional internet
> registries when transition to IPv6 is implemented. However this would be a
> challenge as RIRs have no contractual authority this may create a grey
> market. This challenge may be overcome through a loose membership
> association that allows others to use others resources
>
> - Institution of secure routing objects including PKI to authenticate users
> raises governance/control issues – RIRs have centralized control which may
> make it efficient and better able to address security issues this makes an
> RIR an central governance institution. Membership of security/government
> associations in the RIR would result in infiltration of technical, policy
> agendas that may make the transition to IPv6 complicated
>
> - However it is argued that RIRs should remain neutral and trans-national
> institutions which:
> o maintain a homogenous technical group
> o maintain a bottom-up approach in policy making
> o guarantee the stability of the internet and business continuity of
> members
>
> - main challenges in the deployment of IPv6 include:
> o lack of public education, information and skill
> o limited network policy decisions to make deployment happen
> o lack of incentive to deploy ipv6
>
> *1100-1230 Workshop 59:Building a global capacity building curriculum
> framework and premier*
>
> - Integration of IG capacity building in existing ICT and public policy
> courses was advocated.
>
> - The training may be offered either online, offline or through short term
> executive courses.
>
> - Collaboration between different stakeholders who have different needs is
> imperative in order create an understanding of the issues arising from
> increased used of the internet particularly those that transcend the
> geographical, and cultural borders.
>
> - internet security awareness programme set up in India
>
> - Presentations on the Diplo IG capacity building programme (
> www.diplomacy.edu/ig) – including a demonstration of the online platform.
>
> - The Diplo approach includes the training course (foundation and
> advanced), policy research, policy immersion and community interaction.
>
> - The impact associated with the IG capacity building programme have been
> varied and impressive including the establishment of IG governance masters
> programme in Srilanka and the use of telecentres to disseminate IG related
> information.
>
> - Diplo has successfully offered the training to professional worldwide for
> the last 4 years leading to the establishment of national, regional and
> global community
>
> *1400-1530 Workshop 29: Building confidence and security in the use and
> security in the use of ICTs for African countries
>
> *Main challenges in Africa
> - lack of infrastructure
> - lack of services
>
> Therefore opportunity to learn from mistakes in developing countries and
> establish of computer emergency response team currently there is only one
> active CERT in Africa in Tunisia, South Africa is in the process of setting
> up a CERT with the deadline of 2010 before the FIFA world cup. While
> countries such as Morocco, Kenya and Ivory Coast are thinking about set in
> up CERTs.
>
> The approach in dealing with Cybersecurity in developing countries
>
> Success of Cybersecurity is based on 3pillars
>
> 1. *Technology pillar* – ICT/security tools –including:
> o PCs / networks, physical security tools, data tools (storage media and
> cryptography), availability of infrastructure and application (redundant
> servers and PKI)
>
> 2. *Methodology pillar* – policy, procedures and regulations on three
> levels:
> o managerial level (security policy, management procedures and capacity
> building, audit) Legislative level (law and regulation)
> o operational level (acces control rules, implementation plans, monitoring,
> watch, incidence handling)
> o continuity of services level ( business continuity plan, crisis
> management, drill exercises)
> - actors in this pillar include the government, security professionals and
> users
>
> 3. *Social behaviour pillar* – creating a culture of cyber security
> o cultivate culture of cyber security through continuous action of raising
> awareness using diverse media/channels
> o the target audience includes managers, decision makers, security,
> children, parents, teachers
>
>
> *Case study: CERT-TCC - Tunisia*
>
> *The functions of the CERT include*:
>
> - Watch- collect information from different sources eg CISCO, HP.
> Microsoft, network of CERTs, community of hackers
> - Training
> - Coordination
> - Response
> - Incidence handling
> - Incident analysis
> - Awareness
> - Warning alert
>
> *Key issues*:
>
> • Information, warning and alert – carried out to in collaboration with
> ISPs, managers decision makers, internet community through mailing list,
> call centre, media
>
> • Oriented campaign – utilizing prospectus, posters, email, radio,
> cartoons, video, attack simulation and guides
>
> • Incident handling - training in new tools
>
> • Coordination important in the effective functioning of the CERT –
> incident coordination procedures and information including regional CERTs,
> other CERTs within the country (for example Brazil has more than one CERT),
> ISPs and operators, vendors and integrators, and national authorities.
>
> Need for the formation of CERTs in Africa however the challenges of lack of
> "know how" in IT security need to be overcome through:
> - capacity building
> - encouragement of the development of national solutions based on open
> source components
> - improved R&D capabilities and making it more responsive to urgent needs
> - encouraging academic research in the important topics of security
> (cryptography, methodologies…)
>
> *The following questions and comments were raised*:
>
> - the need for social engineering through the creation of a culture of
> cyber security to be addressed specifically because of the increased
> requirements by government to obligate to provide subscriber identification
> information
>
> - how can African countries start up a cert- through collaboration for
> example with existing CERTs
>
> - in establishing a culture of cybersecurity – consideration should be
> given to the fact that there are different social cultures in different
> countries however there is consensus on issues such as child pornography,
> identity theft
>
> - how can a regional approach be developed where there are differences in
> level of ICT infrastructure and use of infrastructure in the delivery of
> services, what tools can be used to encourage decision makers to be involved
> in the issues of cyber security?
>
> o It was recognised that funding and expertise was required for example
> AFDB, World Bank and Islamic Bank while ITU have regional workshops on cyber
> security
>
> o As African countries build on infrastructure and services – there is an
> opportunity to learn from those that have already developed CERTs.
>
> - How does the CERT monitor traffic: with the collaboration of ISP and
> operators as well as supporting legislation
>
> - Regulators need to advice the government to use ICT in development – this
> is a manifestation of government commitment
>
> - The role of policy making was emphasized – as it provides government
> commitment to using ICT for social economic development and governance and
> consequently support for cyber security initiatives – including the
> formulation of legislation.
>
> - There should not use a piece meal approach to cyber security to prevent
> ineffectiveness for example Mauritius has electronic transaction act but PKI
> not yet established
>
>
>
> On 12/5/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>>
>> Following our recent online discussions on Internet governance issues in
>> Kenya, the Kenya IGF and East African IGF; you may wish to follow the
>> discussion currently ongoing at the global IGF 2008 in Hyderabad India at
>> http://www.intgovforum.org.
>>
>> Below are highlights from workshops I attended on Day 1 December 3rd):
>> *0930-1100 hrs Workshop 43: Legal aspects of governance critical
>> internet Policy issues of public relevance*
>> *1st presentation*
>> The issues on that have legal implications include:
>> • internet security intellectual property rights, infringement, privacy
>> and protection mechanisms
>> • IP domain name protection, conflicts arising out of data and content
>> ownership privacy therefore increasing role of P2P in growth of internet 2
>> • Consumer status and rights in relation to e-commerce cross border and
>> domestic online trade
>> • Telecom issue viz backbone deployment and interconnection costs
>> • Freedom of expression – the extent of censorship and control on online
>> content
>>
>> There is need for capacity building to create meaningful participation of
>> individual and SMEs as well as increasing connectivity through building IXPs
>> and local content development
>>
>> The question was raised as to whether there a need of alternative
>> institutional mechanism.
>> The salient features of the MOU between ICANN and the department of
>> commerce (DoC) include:
>> - The affirmation of the role of private sector leadership
>> - The role of DoC in ensuring transparency and accountability and
>> effective GAC participation
>> - Ensure accountability and publish by-laws and strategic and operational
>> plans
>> - Agreement can be terminated in 120 days
>>
>> The MOU has been criticized because of the following reasons:
>> - US governmental control on root server administration
>> - Inconsistent with WSIS principle where no single government should have
>> a pre-eminent role
>> - Domain name allocation policies need better development
>> - IPv4 address allocation have been imbalanced need to ensure IPv6 address
>> allocation does not suffer the same effects -This assertion was however
>> refuted as IP addresses allocation based on need. The need for prudent
>> management and keeping barriers low for the transition to IPv6 was
>> emphasised.
>>
>> To overcome this WGIG proposed 4 models:
>> - Global policy council
>> - Intenational internet council with leading government role to fulfil the
>> ICANN/IANA functions
>> - GAC to be strengthened with enhanced coordination function
>> - Replace US govt role by general internet council or with world ICANN (in
>> lieu of GAC)
>>
>> The common features of these models were the overwhelming government lead
>> and the presupposition of the possibility of international treaties. During
>> the discussion the viability of these models was questioned given that speed
>> is of essence in the management of internet resources. It normally takes a
>> long time to negotiate international agreements; including treaties instead
>> a set of principles should be endorsed.
>>
>> The speaker recommended on the management of critical internet
>> infrastructure should take into consideration the following
>> • Treatment of technical resources of the internet and global economic,
>> social and legal aspects arising out the internet should be at par
>> • The development and implementation of polices and standards and
>> solutions to various internet issues should be done in a coordinated manner
>> for example telecommunication standard development is done in a hierarchical
>> and predictable way.
>> • New structure would be a supreme authority over internet
>>
>> In conclusion the speaker asked: Does the internet as we know it need to
>> be altered radically? Should the status quo be maintained? Should a Red
>> Cross model of recognition by international community states be given to an
>> international entity like ITU, INTELSAT. However fundamental change is not
>> necessary as failure has not been identified.
>>
>> *My comment*: this presentation was descriptive and despite the fact that
>> an alternative model was proposed the principles, mechanisms that would need
>> to be put in place in order to make it work were not discussed
>>
>> *2nd presentation*
>> The next speaker spoke about the ccTLDs in latin Amercia which are broadly
>> organised into two main groups: non-governmental and governmental
>> organisations. A contribution from the floor however clarified that the
>> Brazilian ccTLD is a multi-stakeholder – coordinated by government – but on
>> a day by day basis operates as a non-governmental organisation. The Indian
>> ccTLD is managed by government and private sector – sovereign interest taken
>> care of through government representation.
>>
>> The rules and regulations under which the institutions that manage the
>> ccTLDs are managed determinate legal framework under which they operate.
>> Consequently ccTLDs are regulated under national law while ICANN regulates
>> gTLDs – The possibility of self regulation is based on the assumption that
>> private sector would act in the public interest.
>>
>> In the discussions some felt that there was need for increased attention
>> of government in the management of ccTLDs – as it was critical
>> infrastructure while on the other hand other felt that there was the risk of
>> excessive regulation with increased involvement of government.
>>
>> *1130 -1200 hrs Workshop 36: Strategies to prevent and fight child
>> pornography in developing countries*
>> Child pornography in Brazil has grown out of the popularity of social
>> networking. However the main challenge has been issues related to
>> jurisdiction as content is resident in ISP based in the USA and
>> trans-national ISPs like Yahoo, Microsoft and Google which have branches in
>> strategic markets and have tailored the services for these markets in terms
>> of language and content.
>>
>> Brazil was therefore unable to deal with serious offences related to
>> content – specifically child pornography - committed by Brazilians using
>> Brazilian IP addresses. The government has been able to sign an agreement
>> with Google to fight child pornography on Google's orkut social network.
>>
>> The following are consideration taken in drawing up the agreement
>> 1. Which criteria should be used to define the ability of a particular
>> country to legislate over and sanction conducts committed on the internet?
>> - Where the data is located?
>> - International law principles (territoriality or nationality) shall be
>> used to define the sovereignty of a state regarding – cyber space – which is
>> a network of networks
>> - Define some reasonable standard – for example managed by Brazilians and
>> is local content and local language
>> - Access points in Brazil, harmful conduct felt in the country – taken
>> obligation under international law to take offence – country of origin
>> approach would force thousands of users to unfamiliar rules and travel –
>> offence under human rights therefore apply local legislation
>>
>> 2. It is legitimate to enforce the conduct of local office –as it
>> impracticable to send legal request to the US.
>>
>>
>> New tools have been implement that have reduced number of images uploaded
>> and increase in number of reported cases- subject to investigation. It was
>> inspiring to listen to parliamentarian talk about the need to have
>> legislators engaged in the process as they ultimately pass the laws. I
>> appreciated the fact that in there is great cooperation between the
>> parliament, government, police, civil society and private sector.
>>
>> The main challenges are:
>> • Lack of awareness and participation by parliamentarians who are critical
>> in the formulation of legislation
>> • how to obligate ISPs to provide information without infringing on
>> freedom of expression and privacy,
>> • what criteria should be used to deal with these offences
>> • the creation of awareness of ISPs in developing countries of the need
>> for judicial cooperation as well as social initiatives to deal with cyber
>> crime.
>> • Insufficient infrastructure to deal with this issue – law enforcement
>> does not have the human resources and technology
>> • Material produced to fight child pornography are not evaluated – they
>> should be inline with the demand
>>
>> *My comment*: I would have like to know if initiatives have reduced
>> offences, what is the success rate registered in prosecution, ability of the
>> law enforcement and judicial system to deal with offences. There was no
>> mention of where initiatives had been launched to fight child pornography on
>> the financial front.
>>
>>
>> *1530-1700 Workshop 45: Opening to diversity and competition of the DNS
>> system*
>>
>>
>>
>> There were 3 presentations in this session:
>>
>>
>> - *1st presentation* - alternate DNS system used in library systems
>>
>>
>> - *2nd presentation* - implementation of security in the Handle system
>>
>>
>> - *3rd presentation –* discussed the Net4D
>>
>>
>>
>> Net4D- provides the technical solution to the political concern on the
>> control of root servers. Net4D networks enable the following:
>>
>> • Empower the second generation of the web: the semantic web.
>>
>> • Multi-stakeholder governance of DNS
>>
>> • Net4D classes should be open and interoperable
>>
>> DNS 1.0 – was a monopoly of ICANN web 1.0 html with USA parentage and
>> English only while DNS 2.0 is open allowing for competition including inter
>> alia:
>>
>> • Net4D semantic web
>>
>> • Open coherent approach to linguistic diversity
>>
>> • Allow technological innovation with value added services
>>
>>
>>
>> Concern was however raised on the:
>>
>> • Investment/implementation cost required to implementation of different
>> DNS systems depending on the BIND implemented and root servers enabled
>>
>> • relinquishing of the political control of root servers
>>
>> • Value to end users
>>
>> • Awareness and understanding of the issues by different stakeholders
>> necessary – delivered in a way that they can understand
>>
>>
>>
>> *My comment*: the session was technical – I hope the techies on the
>> mailing list can help us understand the governance issues associated with
>> the introduction of DNS competition and the impact on developing countries
>> :)!
>>
>>
>>
>> Kind regards
>>
>> mwende
>>
>
>
1
0
Dear All,
Could we comment on the presentation that Brian (a Kenyan) made at the IGF
currently taking place in Hyderabad. It was an excellent presentation on
access befitting the theme of the forum: "Internet for all" and he has
done us proud.
It is also great to have quite a large Kenyan delegation at this India IGF
contributing Kenyan specific IG issues. The IGF is a process/event/forum
that had not received enough attention both at the national and regional
level.
---------
I will also take this opportunity to remind listers of some of the
KICTAnet mailing list rules:
* Please mind your manners:
* Be polite - virtual members are real not a cyberspace borg with no
feelings.
* Watch your words. Kick the bad language - People are listening.
* Laws are laws - Whats real in the real world are the same in
cyberspace.
* Dont send rude or offensive e-mails or postings.
* Be ethical in your posting. Don't lie, plagiarize, defame, or
deliberately do harm to another KICTANet forum user.
If you are not able to respect these simple rules...the KICTANet
administrator will have no choice but to suspend you!
best
alice
Binaifer Nowrojee wrote:
>
> For those who have not read this opinion piece, I would urge you to do
so and reflect on it. Why do we need to bring down Brian Longwe on the
basis of his nationality? Why not celebrate his success? Why assume
that a non-Kenyan will not positively contribute to Kenya?
>
> Best
>
> Binaifer Nowrojee
>
>
>
> Barack Obama and the graveyard of hope
>
> Wambui Mwangi (2008-08-11)
>
> http://www.pambazuka.org/en/category/comment/50078
>
> Printer friendly version
>
> There are 2 comments on this article.
>
> I am finding it very difficult to join in the jubilation about Senator
Barack Obama. Not that I want to deny the man his victory, but my
impulse to celebrate keeps deflating on the idea that the best thing
that happened to little Barack was not growing up in Kenya.
>
> I have been imagining alternative trajectories for him if he had come to
know the world through the eyes of a Kenyan citizen, if his mother and
grandparents had not rescued him from our chaos and contradictions and
brought him up somewhere his intellect and talent could grow.
>
> If he had grown up here, and had he somehow managed to retain most
elements of his current self, he would have been another outstanding,
intelligent and competent Luo man in our midst: and he would have been
killed.
>
> Yes, we would have assassinated a Barack Obama if he had remained ours,
with us, one of us here in this schizophrenic cauldron we call home.
This is not going to stretch the imagination of any Kenyan - after all,
when we had that incredibly good-looking and charismatic home-grown
hero, Tom Mboya, we shot him to death.
>
> And when that austerely intellectual and elegant leader, Robert Ouko,
threatened to look overly intelligent to the world, we killed him too.
We killed Pio Gama Pinto and we killed JM Kariuki. There is no reason to
suppose that Barack Obama, whose integrity of purpose and stringent
sense of ethics even his enemies concede, would have survived his Kenyan
roots.
>
> He is much too intelligent, too charged with the promise of history, too
bold in his claim to a shining destiny, too full of the audacity of
hope, for us to have let him survive. Kenya would have killed Barack
Obama, or at least his dream, as we inevitably destroy, in one way or
another, the best and the boldest of us. Goldenberg whistle blower David
Munyakei's challenge to his country to be bigger than our greed was met
with a whimper, and then with rapid abandonment. We did not deserve him,
either.
>
> As for John Githongo, he should have known better than to take the idea
of public ethics seriously - this is Kenya, after all. Let him enlighten
people at Oxford instead; such considerations are too virtuous for us,
too sensible, too conducive to a promising future. We do not even remark
on the haunting wastage of all this shining accomplishment - Micere Mugo
sings her lyrical poetry for Americans, and we do not even know enough
to mourn the loss.
>
> And yet we are all enchanted with the power of the idea of Barack Obama,
the hope of him, the beauty of his life's trajectory, the universe of
possibilities and probabilities that it conjures for the least of the
rest of us. If someone's cousin's friend's neighbour makes it to the
United States... then we all have a chance. We have a strange
predilection for schizophrenic loves and loyalties; we let geography
dictate our alliances and imaginary lines decide our friends. It is as
if our social contract states that here, at home, we are obliged to
behave like fighting rats to each other but when abroad, when released
from the shackles of kin and clan and conclave, we can fly and soar and
master the sky.
>
> When Wangari Maathai is abroad, we feel that her Nobel Prize is partly
represented in each of our Kenyan living rooms; when she comes home, she
is just another Kikuyu politico. We preen about our athletes winning yet
another international competition to anybody who will give us half a
chance, but when they are at home we turn them into more fodder for
militias.
>
> Caine Prize winners are Kenyan by automatic assent, but Binyavanga
Wainaina is a Kikuyu writer when at home and Yvonne Owuor is indelibly a
Luo - we shrink them to fit the midget-sized visions we have of
ourselves.
>
> It is clear to all of us, and the evidence continues to accrue, that we
have, collectively, a certain global competence, as Kenyans, that we
produce individuals of substance and historical purpose.
>
> Being Kenyan, however, we prefer to drown in the pettiness of our
parochial quarrels when at home, and if one of us threatens to be too
hopeful, too ambitious, too intelligent, too creative or too
inspirational to fit into our trivial little categories of hatred and
suspicion, we kill them, or exile them from our societies, or we just
cause them to run away inside, hiding from us and from themselves the
grandeur of their souls, the splendid landscapes of their imagined
tomorrows.
>
> Nothing but the worst for us, at home. We recognise each other by our
most rancid rhetoric. We insist upon it, we cultivate it, we elevate it
to an art form: Kenyan, and quarrelsome.
>
> Kenyan, and clannish. Kenyan, and counter-productive. Kenyan, and
self-destructive. Kenyan, and consistently heart-breaking. Genius
everywhere, and not a thought to be had. Promise and potential
everywhere, and not an opportunity to be had. Money everywhere, and not
an honest penny to be earned. Helicopters aplenty, but no help for the
needy. A land awash in Cabinet ministers and poverty.
>
> I have been watching Kenyans getting high on Obamamania, and I am
wondering what we are so happy about? It is perhaps that we are
beginning to acknowledge what we should always have known - given a half
a chance, an ever so slightly conducive context, Kenyans are more likely
to over-achieve than not. At the faintest provocation, Kenyans will leap
past expectations without breaking their stride or breaking a sweat,
especially if they happen to have escaped the imprisoning edifice we
call home and found foreign contexts to flourish in, no matter how
alien.
>
> I went to a town in the Canadian Arctic once, in the far north, where in
summer the sun shines even at midnight and in the winter the world is an
endless landscape of ice and snow. Here, far, far away from home, where
nothing was familiar except the gentleness of elderly Inuit women and
the comforting weirdness of the white residents, I was told that the
local dentist had, for many years, been a Kenyan. Everybody said he had
been an excellent dentist, out there in the desert of the cold. I was
unsurprised.
>
> We are an adventurous people, we Kenyans, and we take to the world
outside our home as if born to a conquistador culture - we are brave and
brash and bold, out there. We buy and sell things, and make money at it,
out there. We go to school and excel and cover ourselves with
accreditations, out there. We win things, out there. We get prizes, out
there. We are at our best, out there.
>
> However, at home, for some reason we refuse to either acknowledge or
examine - we have chosen simply to set aside this capacity. Here, at
home, nothing but the very lowest common denominator will do; nothing
but the basest and most brutal aspects of our selves are to be presented
to each other; nothing but the most cynical manipulation is the basis of
our political space. We prefer to be ruled by individuals whose
mediocrity is matched only by their mendacity, here at home.
>
> We prefer to abdicate our adult responsibilities and capacity for reason
to "leaders" whose lack of virtue is as legendary as our attractively
exotic pastoralists. We do not only waste talent, here at home - we go
out of our way to suppress and repress it. We do not only deny dreams,
here in Kenya - we devour them, and ask each other, "Who do you think
you are?" As if the success of another is an affront.
>
> In Kenya, grand vision and soaring imagination is illegitimate; here,
they just call you naive. Out there, you stand a chance of becoming a
hero; at home, you will have nothing but the taste of ashes in your
mouth. Mothers, take your children abroad.
>
> Barack Obama has written two books, in which he discusses ideas. Ideas.
This is a man with vision and conviction, and enough good ideas that
even those who do not like the pigmentally-advantaged are listening, and
changing their minds.
>
> Even those who think that his name sounds suspiciously like a
terrorist's are reading his books and listening to his speeches, and
changing their minds. This is a man with interesting and inspiring
things to say - which disqualifies him from any Kenyan-ness we would
have liked to claim.
>
> Americans like the image of them that Barack Obama has painted in words;
which Kenyan leader would dare to build dreams bigger than his roots?
Which Kenyan leader would ever be so foolish as to attempt inspiration
instead of instigation?
>
> Barack Obama has seduced the world by the power of his persuasiveness,
and while Kenyans raise another glass to the accomplishments of "one of
our own," it seems clear to me that we gave up our rights to him when we
gave up our hopes for ourselves. When we settled for incompetence, and
corruption, and callousness, we defined ourselves out of his universe,
and out of his dreams.
>
> We rejected Barack Obama-ness when we allowed those pangas to slash our
dreams, when we watched our hopes spiral away in smoke. We allowed the
ones who had done this to become the only mirrors of ourselves, and then
squelched our disgraced selves back to the mire of our despondency.
>
> Barack Obama cannot be a Kenyan, and Kenyans cannot grasp Barack Obama's
dream. We have already despaired of it, and of ourselves. His dream
would have died with ours, here at home, here in the graveyard of hope.
>
> But oh, how we yearn to see ourselves reflected in his eyes...
>
>
> *Wambui Mwangi is an assitant professor of Political Science at the
University of Toronto, Canada. This article first appeared inThe East
African, June 15 2008.
>
> *Please send comments to editor(a)pambazuka.org or comment online at
http://www.pambazuka.org/
>
>
>
>
> _______________________________________________
> kictanet mailing list
> kictanet(a)lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>
> This message was sent to: alice(a)apc.org
> Unsubscribe or change your options at
http://lists.kictanet.or.ke/mailman/options/kictanet/alice%40apc.org
8
9
Hi all,
We talk of the big 5 that bring large chunks of foreign currency through tourism, we shamelessly exploit a resource we played no part in developing. Could this be why we cannot create local content and just seat back and hope that the marine cable will bring cyber tourism just like airports brought millions to see the big 5.
I ask, we keep raising the issue of generating local content and yet we still are not making the effort to do it, can someone out there, for example, put online a comprehensive database of schools and colleges that can be easily accessed from anywhere in the country? I remember being given a yellow coloured career booklet when I was in Form 4 which listed all the governments colleges and institutions of learning ranging from tailoring to engineering. Is there no way to take such a booklet, update it and make it instantly available from Lamu to Wajir (not forgetting Chepalungu).
This would at least encourage domestic cyber tourism thus keeping some traffic local, while seriously thinking of what we could provide to foreign cyber tourists. Can we encourage our youth & mentally alive older geeks to come up with a thinggy (for lack of a better phrase e.g what would you have called facebook before facebook) that can drive traffic to Kenya.
ICTBoard find some loose change somewhere to show case serious application ideas nothing like what is domonstrated at the IEEE exhibition (too much cut & paste), lets become venture capitalists (that sounds hip) maybe we can give DJ. CJ a new pet project.
After the post election what which when who where, it might would help the healing to place our diverse cultural practices online so that I can use the tool I understand and respect, the web, to better understand other ethnic groups. Now this could be a cyber tourism puller, maybe even create online villages that someone can become a member of thus learn about the tribe. Develop online language training programs of our various languages which cyber citizens can then learn to better understand the tribes. Our strength is in our diversity let milk it to our benefit.
It is interesting how as kenyans we are aware a problem &know the
solution but for some unexplainable reason we still proceed to the
illogical end. I am a true Kenyan.
There is a very good
Robert Yawe
KAY System Technologies Ltd
Phoenix House, 6th Floor
P O Box 55806 Nairobi, 00200
Kenya
Tel: +254722511225, +254202010696
________________________________
From: Joseph Manthi <jmanthi(a)gmail.com>
To: robert yawe <robertyawe(a)yahoo.co.uk>
Sent: Tuesday, 9 December, 2008 18:15:57
Subject: Re: [kictanet] 1 million Laptops for who?
Robert
Very well said.
1. I agree totally that the Ministry should consider equiping students of the various public universities with laptops that they can take home at the end of their school year, After all these are the very best and brightest Kenya has to offer. One of my former high school classmates told me that the Very Brightest went to the University of Nairobi and the rest went to India, US, Canada, UK and other places according to how deep pocketed your tall relatives were.
2. Secondly, to encourage entrepreneurship shouldn't the ministry in conjunction with the ministry of commerce (I am dating myself?) to build and supply the laptops in Kenya. PCs are now commodities that can be locally assembled.
3. If you agree with 2 above, have African (Kenyan) entrepreneurs build them in rural areas.
My 2 cents.
Joe
On Tue, Dec 9, 2008 at 2:15 AM, robert yawe <robertyawe(a)yahoo.co.uk> wrote:
Hi Dr. Ndemo,
I felt it would not be fair to close the year with one final outburst on your ministries policies.
It was good to see that the governement will be giving laptops to youth in the rural area. http://www.nation.co.ke/business/news/-/1006/499894/-/jh30hdz/-/index.html
Last time I checked 80% of the students in the University are from the "rural areas" would it not make more sense to first equip them with the necessary tools. I recently talked to IT degree students at Nairobi university and was shocked to find that less than 5% have computers dedicated to them and this are not provided by the institution but have been bought privately.
It is good to talk of empowering the rural folk but is this the best way, should we not begin at the top and work our way down. This computers would also provide greater mileage if we example they where to be giving to to students in teacher training colleges so that they can take technology to the schools, country wide that they will be posted to after they graduate?
Also do not forget the medical students who would be able to provide better medical services if they knew how to use and had access to the internet's resources.
Another major issue that is lacking from the story is how the laptops are to be procured, is there any likelihood that they will be assembled locally as if they are we shall be killing to birds with 1 stone.
Robert Yawe
KAY System Technologies Ltd
Phoenix House, 6th Floor
P O Box 55806 Nairobi, 00200
Kenya
Tel: +254722511225, +254202010696
_______________________________________________
kictanet mailing list
kictanet(a)lists.kictanet.or.ke
http://lists.kictanet.or.ke/mailman/listinfo/kictanet
This message was sent to: jmanthi(a)gmail.com
Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/jmanthi%40gmail.com
--
Joseph Manthi
CEO
MEO Ltd
http://www.meoltd.com
2
1
Hi Dr. Ndemo,
I felt it would not be fair to close the year with one final outburst on your ministries policies.
It was good to see that the governement will be giving laptops to youth in the rural area. http://www.nation.co.ke/business/news/-/1006/499894/-/jh30hdz/-/index.html
Last time I checked 80% of the students in the University are from the "rural areas" would it not make more sense to first equip them with the necessary tools. I recently talked to IT degree students at Nairobi university and was shocked to find that less than 5% have computers dedicated to them and this are not provided by the institution but have been bought privately.
It is good to talk of empowering the rural folk but is this the best way, should we not begin at the top and work our way down. This computers would also provide greater mileage if we example they where to be giving to to students in teacher training colleges so that they can take technology to the schools, country wide that they will be posted to after they graduate?
Also do not forget the medical students who would be able to provide better medical services if they knew how to use and had access to the internet's resources.
Another major issue that is lacking from the story is how the laptops are to be procured, is there any likelihood that they will be assembled locally as if they are we shall be killing to birds with 1 stone.
Robert Yawe
KAY System Technologies Ltd
Phoenix House, 6th Floor
P O Box 55806 Nairobi, 00200
Kenya
Tel: +254722511225, +254202010696
1
0
Good Afternoon KICTANET Moderator.
This forum has been very benefital to use when it comes to matters and issues of ICT. However, during the last few weeks its lost value as most of the comments that are flooding our inboxes are witch haunts by a selected few individuals. I urge you to filter this from your mailboxs. I see majority of subscribers asking removal from your mailing list.
Am sure you have seen what has happened and I hope you are doing something about it.
Thanks
Stephen Mwangi
5
8
*Do more. A lot more. Technical Internship Opportunities at Google EMEA
*
Here at Google, we're not looking for people who will just localise
technologies developed in other countries, nor simply engineers focussed on
improving infrastructure. What we are looking for are people with
outstanding technical skills, creativity, potential and passion who can help
invent end-to-end technologies from scratch; stuff that will interest and
inspire millions of users across the world.
During an internship with us you'll have the opportunity to contribute to
projects in a direct and meaningful way. We're taking into account your
skills and interests when determining which of our small and dynamic teams
you will be joining. Your pre-assigned host will find projects that are
right for you and work closely with you during your time with us.
We're confident that an internship with us will be a rewarding experience
that will develop your ability to programme at a global scale, deepen your
understanding of Computer Science and allow you to connect with outstanding
people from all over the world.
Your internship will most likely take place in our engineering centre
in Zurich,
Switzerland<http://www.google.com/support/jobs/bin/static.py?page=studentseu.html&sid=z…>.
If you are accepted for an internship, you'll need to move for the duration
of your time with us and we'll gladly help you with all the logistics (visa,
accommodation) related to this move.
Start and end dates of Google Engineering internships are flexible, with a
minimum duration of three months. Internships are typically full-time
positions, are paid, and take place year-round.
*The ideal intern profile for Google*
To be eligible for an internship, you should be enrolled in a BS, MS or PhD
in Computer Science or a related technical field and be within 12-18 months
of completing a Bachelor's or Master's degree, or at any stage in your PhD.
Please note that you should be returning to university after the end of your
internship, or the internship should be a formal part of completing your
studies.
The following are also key requirements:
- Experience in systems software or algorithms.
- Excellent programming skills (C++; Java and/or Python).
- Knowledge of UNIX/Linux or Windows environments and APIs.
- Familiarity with TCP/IP and network programming a plus.
- Fluency in English
*How to apply? *
We welcome applications from students to spend an internship with us at one
of our European offices and review applications on an ongoing basis. To
maximise your chances of success we'd encourage you to apply as soon as
possible, and 4 months before the desired start of your internship at the
latest. The following
link<http://www.google.com/support/jobs/bin/answer.py?answer=112436>will
lead you to our online job site through which you can submit your
application. Please submit your application for the *Software Engineer
Intern - Europe* position only as it will allow us to process your
application without delay.
Your application should contain the following documents:
- An up-to-date CV
- University transcripts/grades (unofficial is fine, including your GPA
if possible)
- A cover letter stating your graduation date and when you would be
available for an internship (minimum 3, maximum 12 months)
If you like more information about preparing your CV, please have a look at
our Preparing your
CV<http://www.google.com/support/jobs/bin/static.py?page=studentseu.html&sid=r…>section.
*Should you have any questions or experience technical difficulties
submitting your application, please contact us directly at
africa-interns-2009(a)google.com*
1
0
Sure Zacheus,
Thanks for your work. We always follow with implementation. Thats our work.
The only way to move beyond the meeting/committee rooms. Which is what you
expect.
On Mon, Dec 8, 2008 at 4:08 PM, Zacheus Mwatha <zimwatha(a)kebs.org> wrote:
> Dorcas,
>
>
>
> Kindly let's walk the talk.
>
>
>
> Kind regards.
>
>
>
> *Mwatha Z I (Mr.)*
>
> *Kenya Bureau of Standards*
>
> *KEBS Centre, Popo Road, off Mombasa Road, Behind Bellevue Cinema*
>
> *P.O. Box 54974 — 00200 Nairobi, Kenya*
>
> *ISDN: +254 (0)20 6948270*
>
> *Tel: +254 (0)20 605490, 6948000, (0)722 202137*
>
> *Fax:+254 (0)20 609660, 604031*
>
> *Other E-Mail: mwatha_zacs(a)yahoo.com <info(a)kebs.org>*
>
> *Personal Cellphone: +254 (0)722 368998*
>
> *__________________________________________________________ **
> *
> *"Quality products for quality life"*
>
>
>
> *Disclaimer*
>
> This e-mail and its attachments are confidential, private and intended for
> the addressee only. Should you not be the addressee and receive this e-mail
> by mistake, kindly notify the sender, and delete this e-mail, immediately
> and do not disclose or use same in any manner whatsoever. Views and opinions
> expressed in this e-mail are those of the sender unless clearly stated as
> those of KEBS. The Bureau accepts no liability whatsoever for any loss or
> damages whatsoever and howsoever incurred, or suffered, resulting, or
> arising, from the use of this email or its attachments. The Bureau does not
> warrant the integrity of this e-mail nor that it is free of errors, viruses,
> interception or interference. For information about Kenya Bureau of
> Standards visit our website at http://www.kebs.org
>
>
>
> *From:* Dorcas Muthoni [mailto:dmuthoni@gmail.com]
> *Sent:* Jumatatu, Decemba 08, 2008 1:36 PM
> *To:* Gakuru Alex
> *Cc:* Zacheus Mwatha; KICTAnet ICT Policy Discussions
> *Subject:* Re: [kictanet] ADOPTION OF ISO/IEC 26300 AND ISO/IEC 29500
>
>
>
> Dear All,
>
> As documents and services are increasingly transformed from paper to
> electronic form, there is a growing problem that governments and their
> constituents as well as private enterprises may not be able to access,
> retrieve and use critical records, information and documents in the future.
> To enable the public and private sector to have greater control over and
> direct management of their own records, information and documents, it is
> important that we adopt and advance the use of the OpenDocument Format
> (ODF).
>
> It is important that all policymakers, IT administrators, decision mankers
> (for both public and private) advance the benefits and opportunities of the
> OpenDocument Format, to help ensure that government and private enterprise
> information, records and documents are accessible across platforms and
> applications, even as technologies change today and in the future.
>
> Thanks to KEBS for moving Kenya forward on this.
>
> Kindly take two minutes to review and complete the document for adoption.
> Most importantly, remember to submit your signed form back to KEBS.
>
> Thanks Alex for sharing this.
>
> Regards,
> Muthoni
>
> On Mon, Dec 8, 2008 at 1:05 PM, Gakuru Alex <alexgakuru.lists(a)gmail.com>
> wrote:
>
> All,
>
> I am forwarding this as requested on the message body.
>
> Please direct any inquiries to the KEBS staffer copied.
>
> Sincerely,
>
> Alex Gakuru
>
> PS:
> Walubengo is copied to ensure this larger-than-40k post gets bounced.
> AG
>
>
> ---------- Forwarded message ----------
> From: Zacheus Mwatha <zimwatha(a)kebs.org>
> Date: Thu, Dec 4, 2008 at 10:01 AM
> Subject: ADOPTION OF ISO/IEC 26300 AND ISO/IEC 29500
> To: Zaheda Bhorat <zaheda(a)google.com>, Zacheus Mwatha
> <zimwatha(a)kebs.org>, jsevilla(a)strathmore.edu, JOHNSONM(a)za.ibm.com,
> cakunga(a)virtualcity.co.ke, chetan(a)skytechafrica.com,
> dofisi(a)cskonline.org, dkamiri(a)kenyalaw.org,
> michael.owuor(a)manageworks.co.ke, sammy(a)skytechafrica.com,
> mail(a)cskonline.org, bremack1(a)yahoo.com, iondieki(a)vegasoftware.com,
> peterk(a)sdae.co.ke, sammynjuguna(a)hotmail.com, edgar.kioga(a)wfp.org,
> keziah(a)cskonline.org, jkimilu(a)icsit.jkuat.ac.ke,
> samuel.kuria(a)kenya-airways.com, Emmanuel.Birech(a)microsoft.com,
> emailsignet(a)mailcan.com, edgar.okioga(a)gmail.com, pmwele(a)gmail.com,
> csk(a)nbi.ispkenya.com, vawuor2001(a)yahoo.com, waiganjo(a)uonbi.ac.ke,
> Jeremy Allison <jra(a)google.com>, Joseph Mucheru <jmucheru(a)google.com>,
> Gakuru <gakuru(a)gmail.com>, Lucy <lucym(a)za.ibm.com>, Okoth Monica
> <okothm(a)kebs.org>, Wambua Amos <wambuaa(a)kebs.org>
> Cc: mwatha_zacs(a)yahoo.com
>
>
> Dear Sir/Madam,
>
>
>
> There are requests which have been received to adopt the above two
> international standards.
>
>
>
> Attached are self explanatory letters and adoption proposal forms
> which you are kindly requested to complete and return to us for
> processing. Kindly note that the form MUST BE SIGNED AND STAMPED
> otherwise it won't be taken into account during processing. You are
> free to use any mode of transmission (fax/email/post/hand
> delivery/etc) as long as the forms reaches us not later than the due
> date. Any ballots received after the deadline will be disregarded.
>
>
>
> You are free to forward this information to as many stakeholders as
> possible since we need a national response to this matter.
>
>
>
> Finally, if you forward to any stakeholder or group of stakeholders,
> kindly copy me the mail so that i may have a database of all those
> that received the information (if you use bcc it won't be of much help
> to me).
>
>
>
> Kind regards.
>
>
>
> Mwatha Z I (Mr.)
>
> Kenya Bureau of Standards
>
> KEBS Centre, Popo Road, off Mombasa Road, Behind Bellevue Cinema
>
> P.O. Box 54974 — 00200 Nairobi, Kenya
>
> ISDN: +254 (0)20 6948270
>
> Tel: +254 (0)20 605490, 6948000, (0)722 202137
>
> Fax:+254 (0)20 609660, 604031
>
> Other E-Mail: mwatha_zacs(a)yahoo.com
>
> __________________________________________________________
> "Quality products for quality life"
>
>
>
> Disclaimer
>
> This e-mail and its attachments are confidential, private and intended
> for the addressee only. Should you not be the addressee and receive
> this e-mail by mistake, kindly notify the sender, and delete this
> e-mail, immediately and do not disclose or use same in any manner
> whatsoever. Views and opinions expressed in this e-mail are those of
> the sender unless clearly stated as those of KEBS. The Bureau accepts
> no liability whatsoever for any loss or damages whatsoever and
> howsoever incurred, or suffered, resulting, or arising, from the use
> of this email or its attachments. The Bureau does not warrant the
> integrity of this e-mail nor that it is free of errors, viruses,
> interception or interference. For information about Kenya Bureau of
> Standards visit our website at http://www.kebs.org
>
>
>
> --------------------------------------------------
> This message has been scanned for viruses and
> dangerous content by Jambo MailScanner, and is
> believed to be clean.
> --------------------------------------------------
> "easy access to the world"
>
> _______________________________________________
> kictanet mailing list
> kictanet(a)lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>
> This message was sent to: dmuthoni(a)gmail.com
> Unsubscribe or change your options at
> http://lists.kictanet.or.ke/mailman/options/kictanet/dmuthoni%40gmail.com
>
>
>
>
> --
> Muthoni
>
> My Blog: http://rugongo.blogspot.com/
> --------------------------------------------
> Mahatma Gandhi once said:-
>
> First they ignore you,
> Then they laugh at you,
> Then they fight you,
> AND THEN YOU WIN!!!
>
> --------------------------------------------------
> This message has been scanned for viruses and
> dangerous content by *Jambo MailScanner* <http://www.mail.jambo.co.ke/>,
> and is
> believed to be clean.
> --------------------------------------------------
> "easy access to the world"
>
--
Muthoni
My Blog: http://rugongo.blogspot.com/
--------------------------------------------
Mahatma Gandhi once said:-
First they ignore you,
Then they laugh at you,
Then they fight you,
AND THEN YOU WIN!!!
1
0
*5th December 2008*
*930-1100 Panel Discussion Transition from IPv4 to IPv6*
Based on several studies it is projected that IPv4 addresses will be
globally exhausted by 2011 however address space will still be available at
a local level. Seamless take up of IPv6 is expected with the exhaustion of
IPv4 and there is on going discussion – to define policy to facilitate
smooth transition for operators and ensure that new comers have minimum IPv6
address space allocation to start up business.
The following issues were discussed from different perspectives:
*Issues from operators' perspective*:
- Deployment of IPv6 enabled equipment in the core networks should be done
increment – however uptake is low because there is no extra revenue
generated with the implementation of IPv6 i.e. the lack of commercial
drivers. However this is expected to change with the as customer numbers
grow.
- Need for upgrade – therefore operators from developed countries stand at
an advantage as they have the resources and are nearly exhausted their local
allocations.
- Getting operational experience is a challenge – there is need to invest in
operational tools to run IPv6 in terms of software configuration utilities
management and trouble shooting
- Participation in standardization – where users have equipment that
supports only IPv4 – how do they access services that are available only on
IPv6-based networks? The IETF is working on the transition mechanisms
however the co-existence of both protocols is expected for a long time
- Operators are pushing for IPv6 support in customer premise equipment (CPE)
as well as software that supports the new protocol version. However it is
expected that legacy applications will be available in the foreseeable
future
*Issues from a vendor perspective*
- Transition has been going on for some time in the vendor world. The
transition has been a long process for vendors and operators – in terms of
getting the technology and standards ready
- As IP is the core of the internet – transition to ipv6 – is significant
particularly with the increase of IPv6 enabled devices connected to the
internet specifically mobile phones
- need to understand technology and therefore need for operational and
implementation experience
- managing customer demand/expectations for IPv6 enabled services and
devices
- cost of staff training
- there are mistakes that will be made – therefore need for mutual support
in the implementation of v6
*Social and economic perspectives*-
- Transition should be cooperative endeavour with social and economic and
policy considerations
- Gradual implementation and interoperability between IPv4 and v6 expected
so as to preserve the investment already made
- There is a general understanding that IPv6 will compliment and supplement
the existing IPv4 as well as provide improved routing, multicasting,
efficient infrastructure. The following questions however arise:
o The advantages that IPv6 offer are good reasons to invest in the new IP
version.
o Would transition be transparent and would backward compatibility required
- Users want the stability of the internet to be maintained and hope that
IPv6 will offer opportunities for addition to personality features on the
internet – this is what makes the business case
- In the India case there are a large number of service providers – and
there is only a 1/8 usage – therefore demand is low – the need to enhance
cultural diversity however provides opportunities to create demand through
local content development including E-government programme and Info-tainment
- It is important to break the myth that IPv6 is a new internet - It is not
a new internet rather continuation of the internet
- The main benefit is the address space addition- which may allow for
efficiency
- There is no need to establish a deadline or regulate the implementation of
IPv6 – as it will be market driven. Additionally users should have rights to
use IPv4 and IETF is working on coexistence
*Policy perspective*
- With the impending exhaustion of IPv4 – further implementation will be
problematic – as not all players will support transition therefore it is
important to examine measures – for continued use of IPv4 and possible
migration of users to private IPv4 address space
- creation of action plan to be implemented by 2010 – for example offering
of incentives such as tax exemption and capacity building
- examination of existing programmes and mechanisms
- establishment of taskforce of IPv4 exhaustion
- the messages of ISPs is that they must carry IPv6
- IPv4 scarcity and demand for more security are the 2 major challenges
driving the uptake of IPv6
- Institution of market transfer or reclamation mechanisms of IPv4 resources
not required by local internet registries to the regional internet
registries when transition to IPv6 is implemented. However this would be a
challenge as RIRs have no contractual authority this may create a grey
market. This challenge may be overcome through a loose membership
association that allows others to use others resources
- Institution of secure routing objects including PKI to authenticate users
raises governance/control issues – RIRs have centralized control which may
make it efficient and better able to address security issues this makes an
RIR an central governance institution. Membership of security/government
associations in the RIR would result in infiltration of technical, policy
agendas that may make the transition to IPv6 complicated
- However it is argued that RIRs should remain neutral and trans-national
institutions which:
o maintain a homogenous technical group
o maintain a bottom-up approach in policy making
o guarantee the stability of the internet and business continuity of members
- main challenges in the deployment of IPv6 include:
o lack of public education, information and skill
o limited network policy decisions to make deployment happen
o lack of incentive to deploy ipv6
*1100-1230 Workshop 59:Building a global capacity building curriculum
framework and premier*
- Integration of IG capacity building in existing ICT and public policy
courses was advocated.
- The training may be offered either online, offline or through short term
executive courses.
- Collaboration between different stakeholders who have different needs is
imperative in order create an understanding of the issues arising from
increased used of the internet particularly those that transcend the
geographical, and cultural borders.
- internet security awareness programme set up in India
- Presentations on the Diplo IG capacity building programme (
www.diplomacy.edu/ig) – including a demonstration of the online platform.
- The Diplo approach includes the training course (foundation and advanced),
policy research, policy immersion and community interaction.
- The impact associated with the IG capacity building programme have been
varied and impressive including the establishment of IG governance masters
programme in Srilanka and the use of telecentres to disseminate IG related
information.
- Diplo has successfully offered the training to professional worldwide for
the last 4 years leading to the establishment of national, regional and
global community
*1400-1530 Workshop 29: Building confidence and security in the use and
security in the use of ICTs for African countries
*Main challenges in Africa
- lack of infrastructure
- lack of services
Therefore opportunity to learn from mistakes in developing countries and
establish of computer emergency response team currently there is only one
active CERT in Africa in Tunisia, South Africa is in the process of setting
up a CERT with the deadline of 2010 before the FIFA world cup. While
countries such as Morocco, Kenya and Ivory Coast are thinking about set in
up CERTs.
The approach in dealing with Cybersecurity in developing countries
Success of Cybersecurity is based on 3pillars
1. *Technology pillar* – ICT/security tools –including:
o PCs / networks, physical security tools, data tools (storage media and
cryptography), availability of infrastructure and application (redundant
servers and PKI)
2. *Methodology pillar* – policy, procedures and regulations on three
levels:
o managerial level (security policy, management procedures and capacity
building, audit) Legislative level (law and regulation)
o operational level (acces control rules, implementation plans, monitoring,
watch, incidence handling)
o continuity of services level ( business continuity plan, crisis
management, drill exercises)
- actors in this pillar include the government, security professionals and
users
3. *Social behaviour pillar* – creating a culture of cyber security
o cultivate culture of cyber security through continuous action of raising
awareness using diverse media/channels
o the target audience includes managers, decision makers, security,
children, parents, teachers
*Case study: CERT-TCC - Tunisia*
*The functions of the CERT include*:
- Watch- collect information from different sources eg CISCO, HP. Microsoft,
network of CERTs, community of hackers
- Training
- Coordination
- Response
- Incidence handling
- Incident analysis
- Awareness
- Warning alert
*Key issues*:
• Information, warning and alert – carried out to in collaboration with
ISPs, managers decision makers, internet community through mailing list,
call centre, media
• Oriented campaign – utilizing prospectus, posters, email, radio, cartoons,
video, attack simulation and guides
• Incident handling - training in new tools
• Coordination important in the effective functioning of the CERT – incident
coordination procedures and information including regional CERTs, other
CERTs within the country (for example Brazil has more than one CERT), ISPs
and operators, vendors and integrators, and national authorities.
Need for the formation of CERTs in Africa however the challenges of lack of
"know how" in IT security need to be overcome through:
- capacity building
- encouragement of the development of national solutions based on open
source components
- improved R&D capabilities and making it more responsive to urgent needs
- encouraging academic research in the important topics of security
(cryptography, methodologies…)
*The following questions and comments were raised*:
- the need for social engineering through the creation of a culture of cyber
security to be addressed specifically because of the increased requirements
by government to obligate to provide subscriber identification information
- how can African countries start up a cert- through collaboration for
example with existing CERTs
- in establishing a culture of cybersecurity – consideration should be given
to the fact that there are different social cultures in different countries
however there is consensus on issues such as child pornography, identity
theft
- how can a regional approach be developed where there are differences in
level of ICT infrastructure and use of infrastructure in the delivery of
services, what tools can be used to encourage decision makers to be involved
in the issues of cyber security?
o It was recognised that funding and expertise was required for example
AFDB, World Bank and Islamic Bank while ITU have regional workshops on cyber
security
o As African countries build on infrastructure and services – there is an
opportunity to learn from those that have already developed CERTs.
- How does the CERT monitor traffic: with the collaboration of ISP and
operators as well as supporting legislation
- Regulators need to advice the government to use ICT in development – this
is a manifestation of government commitment
- The role of policy making was emphasized – as it provides government
commitment to using ICT for social economic development and governance and
consequently support for cyber security initiatives – including the
formulation of legislation.
- There should not use a piece meal approach to cyber security to prevent
ineffectiveness for example Mauritius has electronic transaction act but PKI
not yet established
On 12/5/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>
> Following our recent online discussions on Internet governance issues in
> Kenya, the Kenya IGF and East African IGF; you may wish to follow the
> discussion currently ongoing at the global IGF 2008 in Hyderabad India at
> http://www.intgovforum.org.
>
> Below are highlights from workshops I attended on Day 1 December 3rd):
> *0930-1100 hrs Workshop 43: Legal aspects of governance critical internet
> Policy issues of public relevance*
> *1st presentation*
> The issues on that have legal implications include:
> • internet security intellectual property rights, infringement, privacy and
> protection mechanisms
> • IP domain name protection, conflicts arising out of data and content
> ownership privacy therefore increasing role of P2P in growth of internet 2
> • Consumer status and rights in relation to e-commerce cross border and
> domestic online trade
> • Telecom issue viz backbone deployment and interconnection costs
> • Freedom of expression – the extent of censorship and control on online
> content
>
> There is need for capacity building to create meaningful participation of
> individual and SMEs as well as increasing connectivity through building IXPs
> and local content development
>
> The question was raised as to whether there a need of alternative
> institutional mechanism.
> The salient features of the MOU between ICANN and the department of
> commerce (DoC) include:
> - The affirmation of the role of private sector leadership
> - The role of DoC in ensuring transparency and accountability and effective
> GAC participation
> - Ensure accountability and publish by-laws and strategic and operational
> plans
> - Agreement can be terminated in 120 days
>
> The MOU has been criticized because of the following reasons:
> - US governmental control on root server administration
> - Inconsistent with WSIS principle where no single government should have a
> pre-eminent role
> - Domain name allocation policies need better development
> - IPv4 address allocation have been imbalanced need to ensure IPv6 address
> allocation does not suffer the same effects -This assertion was however
> refuted as IP addresses allocation based on need. The need for prudent
> management and keeping barriers low for the transition to IPv6 was
> emphasised.
>
> To overcome this WGIG proposed 4 models:
> - Global policy council
> - Intenational internet council with leading government role to fulfil the
> ICANN/IANA functions
> - GAC to be strengthened with enhanced coordination function
> - Replace US govt role by general internet council or with world ICANN (in
> lieu of GAC)
>
> The common features of these models were the overwhelming government lead
> and the presupposition of the possibility of international treaties. During
> the discussion the viability of these models was questioned given that speed
> is of essence in the management of internet resources. It normally takes a
> long time to negotiate international agreements; including treaties instead
> a set of principles should be endorsed.
>
> The speaker recommended on the management of critical internet
> infrastructure should take into consideration the following
> • Treatment of technical resources of the internet and global economic,
> social and legal aspects arising out the internet should be at par
> • The development and implementation of polices and standards and solutions
> to various internet issues should be done in a coordinated manner for
> example telecommunication standard development is done in a hierarchical and
> predictable way.
> • New structure would be a supreme authority over internet
>
> In conclusion the speaker asked: Does the internet as we know it need to be
> altered radically? Should the status quo be maintained? Should a Red Cross
> model of recognition by international community states be given to an
> international entity like ITU, INTELSAT. However fundamental change is not
> necessary as failure has not been identified.
>
> *My comment*: this presentation was descriptive and despite the fact that
> an alternative model was proposed the principles, mechanisms that would need
> to be put in place in order to make it work were not discussed
>
> *2nd presentation*
> The next speaker spoke about the ccTLDs in latin Amercia which are broadly
> organised into two main groups: non-governmental and governmental
> organisations. A contribution from the floor however clarified that the
> Brazilian ccTLD is a multi-stakeholder – coordinated by government – but on
> a day by day basis operates as a non-governmental organisation. The Indian
> ccTLD is managed by government and private sector – sovereign interest taken
> care of through government representation.
>
> The rules and regulations under which the institutions that manage the
> ccTLDs are managed determinate legal framework under which they operate.
> Consequently ccTLDs are regulated under national law while ICANN regulates
> gTLDs – The possibility of self regulation is based on the assumption that
> private sector would act in the public interest.
>
> In the discussions some felt that there was need for increased attention of
> government in the management of ccTLDs – as it was critical infrastructure
> while on the other hand other felt that there was the risk of excessive
> regulation with increased involvement of government.
>
> *1130 -1200 hrs Workshop 36: Strategies to prevent and fight child
> pornography in developing countries*
> Child pornography in Brazil has grown out of the popularity of social
> networking. However the main challenge has been issues related to
> jurisdiction as content is resident in ISP based in the USA and
> trans-national ISPs like Yahoo, Microsoft and Google which have branches in
> strategic markets and have tailored the services for these markets in terms
> of language and content.
>
> Brazil was therefore unable to deal with serious offences related to
> content – specifically child pornography - committed by Brazilians using
> Brazilian IP addresses. The government has been able to sign an agreement
> with Google to fight child pornography on Google's orkut social network.
>
> The following are consideration taken in drawing up the agreement
> 1. Which criteria should be used to define the ability of a particular
> country to legislate over and sanction conducts committed on the internet?
> - Where the data is located?
> - International law principles (territoriality or nationality) shall be
> used to define the sovereignty of a state regarding – cyber space – which is
> a network of networks
> - Define some reasonable standard – for example managed by Brazilians and
> is local content and local language
> - Access points in Brazil, harmful conduct felt in the country – taken
> obligation under international law to take offence – country of origin
> approach would force thousands of users to unfamiliar rules and travel –
> offence under human rights therefore apply local legislation
>
> 2. It is legitimate to enforce the conduct of local office –as it
> impracticable to send legal request to the US.
>
>
> New tools have been implement that have reduced number of images uploaded
> and increase in number of reported cases- subject to investigation. It was
> inspiring to listen to parliamentarian talk about the need to have
> legislators engaged in the process as they ultimately pass the laws. I
> appreciated the fact that in there is great cooperation between the
> parliament, government, police, civil society and private sector.
>
> The main challenges are:
> • Lack of awareness and participation by parliamentarians who are critical
> in the formulation of legislation
> • how to obligate ISPs to provide information without infringing on freedom
> of expression and privacy,
> • what criteria should be used to deal with these offences
> • the creation of awareness of ISPs in developing countries of the need for
> judicial cooperation as well as social initiatives to deal with cyber crime.
> • Insufficient infrastructure to deal with this issue – law enforcement
> does not have the human resources and technology
> • Material produced to fight child pornography are not evaluated – they
> should be inline with the demand
>
> *My comment*: I would have like to know if initiatives have reduced
> offences, what is the success rate registered in prosecution, ability of the
> law enforcement and judicial system to deal with offences. There was no
> mention of where initiatives had been launched to fight child pornography on
> the financial front.
>
>
> *1530-1700 Workshop 45: Opening to diversity and competition of the DNS
> system*
>
>
>
> There were 3 presentations in this session:
>
>
> - *1st presentation* - alternate DNS system used in library systems
>
>
> - *2nd presentation* - implementation of security in the Handle system
>
>
> - *3rd presentation –* discussed the Net4D
>
>
>
> Net4D- provides the technical solution to the political concern on the
> control of root servers. Net4D networks enable the following:
>
> • Empower the second generation of the web: the semantic web.
>
> • Multi-stakeholder governance of DNS
>
> • Net4D classes should be open and interoperable
>
> DNS 1.0 – was a monopoly of ICANN web 1.0 html with USA parentage and
> English only while DNS 2.0 is open allowing for competition including inter
> alia:
>
> • Net4D semantic web
>
> • Open coherent approach to linguistic diversity
>
> • Allow technological innovation with value added services
>
>
>
> Concern was however raised on the:
>
> • Investment/implementation cost required to implementation of different
> DNS systems depending on the BIND implemented and root servers enabled
>
> • relinquishing of the political control of root servers
>
> • Value to end users
>
> • Awareness and understanding of the issues by different stakeholders
> necessary – delivered in a way that they can understand
>
>
>
> *My comment*: the session was technical – I hope the techies on the
> mailing list can help us understand the governance issues associated with
> the introduction of DNS competition and the impact on developing countries
> :)!
>
>
>
> Kind regards
>
> mwende
>
1
0
All,
I am forwarding this as requested on the message body.
Please direct any inquiries to the KEBS staffer copied.
Sincerely,
Alex Gakuru
PS:
Walubengo is copied to ensure this larger-than-40k post gets bounced.
AG
---------- Forwarded message ----------
From: Zacheus Mwatha <zimwatha(a)kebs.org>
Date: Thu, Dec 4, 2008 at 10:01 AM
Subject: ADOPTION OF ISO/IEC 26300 AND ISO/IEC 29500
To: Zaheda Bhorat <zaheda(a)google.com>, Zacheus Mwatha
<zimwatha(a)kebs.org>, jsevilla(a)strathmore.edu, JOHNSONM(a)za.ibm.com,
cakunga(a)virtualcity.co.ke, chetan(a)skytechafrica.com,
dofisi(a)cskonline.org, dkamiri(a)kenyalaw.org,
michael.owuor(a)manageworks.co.ke, sammy(a)skytechafrica.com,
mail(a)cskonline.org, bremack1(a)yahoo.com, iondieki(a)vegasoftware.com,
peterk(a)sdae.co.ke, sammynjuguna(a)hotmail.com, edgar.kioga(a)wfp.org,
keziah(a)cskonline.org, jkimilu(a)icsit.jkuat.ac.ke,
samuel.kuria(a)kenya-airways.com, Emmanuel.Birech(a)microsoft.com,
emailsignet(a)mailcan.com, edgar.okioga(a)gmail.com, pmwele(a)gmail.com,
csk(a)nbi.ispkenya.com, vawuor2001(a)yahoo.com, waiganjo(a)uonbi.ac.ke,
Jeremy Allison <jra(a)google.com>, Joseph Mucheru <jmucheru(a)google.com>,
Gakuru <gakuru(a)gmail.com>, Lucy <lucym(a)za.ibm.com>, Okoth Monica
<okothm(a)kebs.org>, Wambua Amos <wambuaa(a)kebs.org>
Cc: mwatha_zacs(a)yahoo.com
Dear Sir/Madam,
There are requests which have been received to adopt the above two
international standards.
Attached are self explanatory letters and adoption proposal forms
which you are kindly requested to complete and return to us for
processing. Kindly note that the form MUST BE SIGNED AND STAMPED
otherwise it won't be taken into account during processing. You are
free to use any mode of transmission (fax/email/post/hand
delivery/etc) as long as the forms reaches us not later than the due
date. Any ballots received after the deadline will be disregarded.
You are free to forward this information to as many stakeholders as
possible since we need a national response to this matter.
Finally, if you forward to any stakeholder or group of stakeholders,
kindly copy me the mail so that i may have a database of all those
that received the information (if you use bcc it won't be of much help
to me).
Kind regards.
Mwatha Z I (Mr.)
Kenya Bureau of Standards
KEBS Centre, Popo Road, off Mombasa Road, Behind Bellevue Cinema
P.O. Box 54974 — 00200 Nairobi, Kenya
ISDN: +254 (0)20 6948270
Tel: +254 (0)20 605490, 6948000, (0)722 202137
Fax:+254 (0)20 609660, 604031
Other E-Mail: mwatha_zacs(a)yahoo.com
__________________________________________________________
"Quality products for quality life"
Disclaimer
This e-mail and its attachments are confidential, private and intended
for the addressee only. Should you not be the addressee and receive
this e-mail by mistake, kindly notify the sender, and delete this
e-mail, immediately and do not disclose or use same in any manner
whatsoever. Views and opinions expressed in this e-mail are those of
the sender unless clearly stated as those of KEBS. The Bureau accepts
no liability whatsoever for any loss or damages whatsoever and
howsoever incurred, or suffered, resulting, or arising, from the use
of this email or its attachments. The Bureau does not warrant the
integrity of this e-mail nor that it is free of errors, viruses,
interception or interference. For information about Kenya Bureau of
Standards visit our website at http://www.kebs.org
--------------------------------------------------
This message has been scanned for viruses and
dangerous content by Jambo MailScanner, and is
believed to be clean.
--------------------------------------------------
"easy access to the world"
2
1
Google Zawadi Africa Scholarship
As part of Google ongoing commitments to supporting education in Africa and
to diversifying the engineering talent pool, they are encouraging African
women to pursue careers in computer science and technology.
Google has partnered with the Zawadi Africa Educational Fund to grant five
Kenyan women full scholarships to complete degrees in computer science,
computer engineering and/or ICT.
The Google Zawadi Scholars will pursue studies at top universities in
Kenyaand South
Africa, and they'll each have the support of a Google engineering mentor.
*Selection criteria include:*
Excellent academics
Extracurricular involvement Leadership potential and financial need. *
Contacts:*
Zawadi Africa Educational Fund
P.O. Box 541046 Cincinnati OH45244
Tel: 513-289-8315 Fax: 513-624-6766
Email: info [at] zawadiafrica. org <http://zawadiafrica.org/>
The scholarship is offered every yaer.
1
0
05 Dec '08
Hello members,
It's my feeling that none of us can exercise the powers of Director of
Immigration (whatever the title is), or even the Minister for Immigration.
If anyone feels Brian is NOT Kenyan, then the right people to sort that out
would be the govt, not KICTANet.
I believe we all remember the purpose for which we are members of KICTANet
and I am sure it has nothing to do with sorting out citizenship issues.
Let KICTANet list be what it was conceived for.
If there is anyone who feels deeply aggrieved by Brian's nationality, they
can address it elsewhere, rather than waste time with it on this list.
Let's put it this way.... I am going to apply the moderation bit on any
poster who insists on discussing this issue. My action might be seen to be
draconian but it will save us the agony of discussing non-issues.
--
Best regards,
Odhiambo WASHINGTON,
Nairobi,KE
+254733744121/+254722743223
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
"Okay guys. This is Kenya. You pay taxes because you feel philanthropic,
unlike our MPs!"
-- Kenneth Marende, Speaker, 10th Parilament.
4
4