KICTANet
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- 35 participants
- 12943 discussions
*Day 2: 4th December 2008*
* *
*Theme: Promoting Cybersecurity and Trust *
* *
*0930-1100 Panel discussions: Dimensions of Cybersecurity and Cybercrime*
The internet was not originally designed with security features however with
increased use of the internet security considerations arise.
It is important to recognize regional, local and cultural issues that may
affect cyber security and develop a relationship of trust in order to
develop a framework that determines - what happens in a crisis, how to
engage in law enforcement. This is important as security issues need to be
addressed before there is a crisis and should be done at all levels.
*Computer Emergency Response Team*
* *
The use of the Computer Emergency Response Team (CERT) at a regional and
national level based on the framework developed by the Carnegie Mellon
University (www.cert.org) as follows:
1. *Organisational *
At an organisational level there should be a person responsible for security
– the response to security threats need to be formalized – that is
organizational incident response should be formalized.
1. *National*
Formation of national CERT is necessary but not sufficient. Channels for
relaying of information, mitigating threats need to be organised and tested
on a regular basis. The national CERT should work with regional CERT as
well as have links with law enforcement organisations.
There is need for development of a strategy as well as testing of the
system. Any incidents should be reviewed.
The goals of CERT should include:
- early detection,
- short response time,
- reduction of impact,
- recognition of liability issues,
- analysis techniques – which are forensically safe, need to be developed
in advance not when time is of the essence
- Alignment of with partners
ITU-D study group 1 Q 22/1 is studying issues on: *Securing information and
communication networks: best practices for developing a culture of
Cybersecurity*
The security should be implemented without damaging the nature of the
internet, and protecting vulnerable groups
*Introduction of cybercrime and terrorism*
Traditional crime has moved online for example harassment and money
laundering however there are new forms of crime in the virtual world
including:
- phishing, virus/malware, etc
- Critical infrastructure threats – banking, transport, banking,
energy, government and national security
- Terrorist use of the internet to publish ideologies, raise funds,
recruit new members
The challenges in combating cybercrime and terrorism:
- The crime scene and who is in charge with dealing with the
threat.
- Relevance of geographic distance
- Investigative cost and the need to carry out real time
investigations
- Legal framework
- Procedural legal problems
- Complex search and seizure laws
- Responsibility and data
- It complex due to numerous operators involved
*Questions and discussions*
- Global issue – which needs coordinated effort and cooperation -
in order to avoid the development of cyber havens.
- Action, feedback and reaction necessary in order to update
prevention mechanisms with regard to recent incidents
- A relationship of trust important between the CERT and ISPs –ISPs
need to provide data – this should a bottom up process
- Organisations work in an eco-system –sharing of information –
collecting statistics before, during and after an incident
- Access (usage and querying) to the data base at the CERT should
be controlled – because of privacy issues
- A mutual Non-Disclosure Agreement (NDA) and formal structures
should be created through a formal bottom-up process.
- Network based crime raise issues associated with creating an
appropriate balance between the needs of those investigating and prosecuting
and rights and interests.
- Need for coordination is a challenge to governments because of
the lack of expertise – therefore have to rely on academia and private
sector
- The CERT should be an independent group of experts that should be
fully empowered
- Appropriate safeguards to protect the functioning of the
organisation necessary as they give confidence and ensure business
continuity during investigation
- New institutional models based on hybrid frameworks – for example
Sri-Lanka CERT was set up in June 2006 and involves government as well as
skilled incident handlers (http://www.slcert.gov.lk/)
- Need for increased cooperation as cyber crime is
multi-jurisdiction issue – harmonization of enforcement processes and
legislation approach such as that of the council of Europe.
* *
*Indian CERT*
- The internet is used for numerous activities leading to an
increase cyber attacks consequently there is a need for training on best
practices and implementation.
- India's legislation includes computer related offences and is
currently being amended to be in line with the European cyber convention.
- National CERT operates in partnership with Asia and pacific CERTs
- The Indian CERT is a government lead industry initiative – that
aims at creating awareness and compliance to best practices
- Training of law enforcement officers on analysis of computer
related crime a challenge and undertaken through PPP.
- A secure national cyberspace – requires collaboration, research
in technologies through a bottom-up process.
- Areas of conflicting interest need to be addressed as cybercrime
is a global phenomenal – these areas include conflict with individual
rights, unnecessary censorship and society issues
- Establishment of global alliances essential to ensure stability
of internet
- Sharing to data about cyber attacks is a challenge
- Establishment of a CERT takes time – needs to include
participation of private sector partners
The ITU has identified five pillars with regard to internet security which
include:
1. Legal issues
2. Technical procedural issues, Organisational structures including
CERTs
3. Capacity building
4. International cooperation
There is need for proactive approach to provide an early warning system for
example that used in the event of natural disasters as well as need for
organisation and cooperation between all stakeholders.
With regard to initiating internet security measures – start with an issue
where there is a common understanding for example child protection which was
the basis of the launch of the child line protection.
*Capacity building*
*Issues*
- Lack of capacity in of ISPs
- Inter-south cooperation required as challenges and infrastructure
similar
- Retention of skilled human resources a challenge
- Use of network operator groups for capacity building
- Need to utilize the existing educational framework by integration
of cybersecurity into curriculum – this creates sustainability in capacity
building
- Training should be relevant to the environment – appropriate use
of technology, cost, concentrate on getting the maximum benefit – innovation
in order to derive the maximum value will be based on training received
- Need for collaboration platform – so as to continue sharing
information
- Need to focus on reality on the ground
*Kind of training*
- technical training
- policy issues – IPv4/6
*Technical challenges*
- operators need to be profitable – environment liberalized –
however still certain monopolized areas – international connectivity –
imbalanced competition – therefore profitability issue- cant invest in new
technologies – limited investment in training
*My comment*: Urgent need create of culture of cybersecurity (end-users, at
organisation level and nationally) and establishment of national, regional
CERTs.
*14:30 - 16:00 Workshop 76 Neutrality Debate Important for You? (Network
Neutrality Debate: The Implications for Development) *
* *
*Technical issues*
All networks need to be managed
High broadband connectivity principles
(
http://www.tiaonline.org/gov_affairs/issues/internet_services_applications/…
)
- transparency
- ability to attach any device
- right to access any legal content
- right to download any legal content
*Economic issues*
Net neutrality has significant micro and macro implications. Broadband
investment influenced by the broad economic environment because of the
massive investment required
- Regulation is viewed more beneficial in view of the current
economic crisis
- More users create value to the platform
- Optimal pricing structure – a possibility - may not want to
charge content providers to contribute to access
- Mandatory net neutrality/unbundling expected to depress
investment in broadband plus may have a significant negative effect on
investment NGN.
- Centre for European Policy Studies – research titled: "I own the
pipes, you call the tune: The net neutrality debate and its (ir) relevance
for Europe" available at http://shop.ceps.eu/BookDetail.php?item_id=1755 –
argues that the internet is not neutral – pro-neutrality rules/changes being
proposed should be evaluated
- The analogy of the roads and vehicles was used to describe net
neutrality – the roads represent the pipes while the cars represent the
packets/traffic – which are not regulated and may be of any shape or
size. However
there is regulation with regard to speed.
- issue of convergence – important for users
- internet to drive innovation and economic growth
- activism issues are important to understand the issues
- slowing down the traffic and packets on internet has a
consequence of slowing down the development internet
*Issues from a user perspective*
- no consensus on the issues exists
- Users do not necessarily want free/unlimited control – however
what they want is: what they access should not be controlled
- They do not want to be forced to buy their store brands or
services of preferred service providers of the broadband connectivity
provider.
- There is no value in packaging/bundling of services – rather it
is designed to sell services at a high price
- Users question whether a free market would help as suppliers are
out to make money – there is an economic motivation to invest – which means
there is no one to look out for consumers
- Need for establish anti trust/anti monopoly regulations
- ISPs must be made to know that users are not willing to give up
their rights thus should develop internet usage plans that are favourable to
the users - suppliers must listen to consumers
- Users have the power to demand what we want if only they demanded
it
- The investment on the internet should be allowed in all areas –
core and edges without fragmenting it - networks should be built using open
interfaces - end to end principle protection is significant
- Users want the internet to encourage innovation
- Use of restaurant analogy where the chairs, tables and food are
outsourced
- Users should have the ability to have access to the content they
want as long as it is connected to open interfaces
- Users have concern on the future of the internet; content
equality and its ability to deliver content in different ways thus
encouraging local innovation
*My comment:* significance of net neutrality with reference to developing
countries was not addressed – taking into consideration that the motivation
for investment in broadband connectivity is socio-economic development thus
deployment of both local and international for example submarine cable is
being done by governments rather than the private sector.
On 12/8/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>
> *5th December 2008*
> *930-1100 Panel Discussion Transition from IPv4 to IPv6*
> Based on several studies it is projected that IPv4 addresses will be
> globally exhausted by 2011 however address space will still be available at
> a local level. Seamless take up of IPv6 is expected with the exhaustion of
> IPv4 and there is on going discussion – to define policy to facilitate
> smooth transition for operators and ensure that new comers have minimum IPv6
> address space allocation to start up business.
>
> The following issues were discussed from different perspectives:
>
> *Issues from operators' perspective*:
> - Deployment of IPv6 enabled equipment in the core networks should be done
> increment – however uptake is low because there is no extra revenue
> generated with the implementation of IPv6 i.e. the lack of commercial
> drivers. However this is expected to change with the as customer numbers
> grow.
>
> - Need for upgrade – therefore operators from developed countries stand at
> an advantage as they have the resources and are nearly exhausted their local
> allocations.
>
> - Getting operational experience is a challenge – there is need to invest
> in operational tools to run IPv6 in terms of software configuration
> utilities management and trouble shooting
>
> - Participation in standardization – where users have equipment that
> supports only IPv4 – how do they access services that are available only on
> IPv6-based networks? The IETF is working on the transition mechanisms
> however the co-existence of both protocols is expected for a long time
>
> - Operators are pushing for IPv6 support in customer premise equipment
> (CPE) as well as software that supports the new protocol version. However it
> is expected that legacy applications will be available in the foreseeable
> future
>
> *Issues from a vendor perspective*
> - Transition has been going on for some time in the vendor world. The
> transition has been a long process for vendors and operators – in terms of
> getting the technology and standards ready
>
> - As IP is the core of the internet – transition to ipv6 – is significant
> particularly with the increase of IPv6 enabled devices connected to the
> internet specifically mobile phones
>
> - need to understand technology and therefore need for operational and
> implementation experience
>
> - managing customer demand/expectations for IPv6 enabled services and
> devices
>
> - cost of staff training
>
> - there are mistakes that will be made – therefore need for mutual support
> in the implementation of v6
>
> *Social and economic perspectives*-
> - Transition should be cooperative endeavour with social and economic and
> policy considerations
>
> - Gradual implementation and interoperability between IPv4 and v6 expected
> so as to preserve the investment already made
>
> - There is a general understanding that IPv6 will compliment and supplement
> the existing IPv4 as well as provide improved routing, multicasting,
> efficient infrastructure. The following questions however arise:
>
> o The advantages that IPv6 offer are good reasons to invest in the new IP
> version.
> o Would transition be transparent and would backward compatibility required
>
> - Users want the stability of the internet to be maintained and hope that
> IPv6 will offer opportunities for addition to personality features on the
> internet – this is what makes the business case
>
> - In the India case there are a large number of service providers – and
> there is only a 1/8 usage – therefore demand is low – the need to enhance
> cultural diversity however provides opportunities to create demand through
> local content development including E-government programme and Info-tainment
>
> - It is important to break the myth that IPv6 is a new internet - It is not
> a new internet rather continuation of the internet
>
> - The main benefit is the address space addition- which may allow for
> efficiency
>
> - There is no need to establish a deadline or regulate the implementation
> of IPv6 – as it will be market driven. Additionally users should have rights
> to use IPv4 and IETF is working on coexistence
>
> *Policy perspective*
> - With the impending exhaustion of IPv4 – further implementation will be
> problematic – as not all players will support transition therefore it is
> important to examine measures – for continued use of IPv4 and possible
> migration of users to private IPv4 address space
>
> - creation of action plan to be implemented by 2010 – for example offering
> of incentives such as tax exemption and capacity building
>
> - examination of existing programmes and mechanisms
>
> - establishment of taskforce of IPv4 exhaustion
>
> - the messages of ISPs is that they must carry IPv6
>
> - IPv4 scarcity and demand for more security are the 2 major challenges
> driving the uptake of IPv6
>
> - Institution of market transfer or reclamation mechanisms of IPv4
> resources not required by local internet registries to the regional internet
> registries when transition to IPv6 is implemented. However this would be a
> challenge as RIRs have no contractual authority this may create a grey
> market. This challenge may be overcome through a loose membership
> association that allows others to use others resources
>
> - Institution of secure routing objects including PKI to authenticate users
> raises governance/control issues – RIRs have centralized control which may
> make it efficient and better able to address security issues this makes an
> RIR an central governance institution. Membership of security/government
> associations in the RIR would result in infiltration of technical, policy
> agendas that may make the transition to IPv6 complicated
>
> - However it is argued that RIRs should remain neutral and trans-national
> institutions which:
> o maintain a homogenous technical group
> o maintain a bottom-up approach in policy making
> o guarantee the stability of the internet and business continuity of
> members
>
> - main challenges in the deployment of IPv6 include:
> o lack of public education, information and skill
> o limited network policy decisions to make deployment happen
> o lack of incentive to deploy ipv6
>
> *1100-1230 Workshop 59:Building a global capacity building curriculum
> framework and premier*
>
> - Integration of IG capacity building in existing ICT and public policy
> courses was advocated.
>
> - The training may be offered either online, offline or through short term
> executive courses.
>
> - Collaboration between different stakeholders who have different needs is
> imperative in order create an understanding of the issues arising from
> increased used of the internet particularly those that transcend the
> geographical, and cultural borders.
>
> - internet security awareness programme set up in India
>
> - Presentations on the Diplo IG capacity building programme (
> www.diplomacy.edu/ig) – including a demonstration of the online platform.
>
> - The Diplo approach includes the training course (foundation and
> advanced), policy research, policy immersion and community interaction.
>
> - The impact associated with the IG capacity building programme have been
> varied and impressive including the establishment of IG governance masters
> programme in Srilanka and the use of telecentres to disseminate IG related
> information.
>
> - Diplo has successfully offered the training to professional worldwide for
> the last 4 years leading to the establishment of national, regional and
> global community
>
> *1400-1530 Workshop 29: Building confidence and security in the use and
> security in the use of ICTs for African countries
>
> *Main challenges in Africa
> - lack of infrastructure
> - lack of services
>
> Therefore opportunity to learn from mistakes in developing countries and
> establish of computer emergency response team currently there is only one
> active CERT in Africa in Tunisia, South Africa is in the process of setting
> up a CERT with the deadline of 2010 before the FIFA world cup. While
> countries such as Morocco, Kenya and Ivory Coast are thinking about set in
> up CERTs.
>
> The approach in dealing with Cybersecurity in developing countries
>
> Success of Cybersecurity is based on 3pillars
>
> 1. *Technology pillar* – ICT/security tools –including:
> o PCs / networks, physical security tools, data tools (storage media and
> cryptography), availability of infrastructure and application (redundant
> servers and PKI)
>
> 2. *Methodology pillar* – policy, procedures and regulations on three
> levels:
> o managerial level (security policy, management procedures and capacity
> building, audit) Legislative level (law and regulation)
> o operational level (acces control rules, implementation plans, monitoring,
> watch, incidence handling)
> o continuity of services level ( business continuity plan, crisis
> management, drill exercises)
> - actors in this pillar include the government, security professionals and
> users
>
> 3. *Social behaviour pillar* – creating a culture of cyber security
> o cultivate culture of cyber security through continuous action of raising
> awareness using diverse media/channels
> o the target audience includes managers, decision makers, security,
> children, parents, teachers
>
>
> *Case study: CERT-TCC - Tunisia*
>
> *The functions of the CERT include*:
>
> - Watch- collect information from different sources eg CISCO, HP.
> Microsoft, network of CERTs, community of hackers
> - Training
> - Coordination
> - Response
> - Incidence handling
> - Incident analysis
> - Awareness
> - Warning alert
>
> *Key issues*:
>
> • Information, warning and alert – carried out to in collaboration with
> ISPs, managers decision makers, internet community through mailing list,
> call centre, media
>
> • Oriented campaign – utilizing prospectus, posters, email, radio,
> cartoons, video, attack simulation and guides
>
> • Incident handling - training in new tools
>
> • Coordination important in the effective functioning of the CERT –
> incident coordination procedures and information including regional CERTs,
> other CERTs within the country (for example Brazil has more than one CERT),
> ISPs and operators, vendors and integrators, and national authorities.
>
> Need for the formation of CERTs in Africa however the challenges of lack of
> "know how" in IT security need to be overcome through:
> - capacity building
> - encouragement of the development of national solutions based on open
> source components
> - improved R&D capabilities and making it more responsive to urgent needs
> - encouraging academic research in the important topics of security
> (cryptography, methodologies…)
>
> *The following questions and comments were raised*:
>
> - the need for social engineering through the creation of a culture of
> cyber security to be addressed specifically because of the increased
> requirements by government to obligate to provide subscriber identification
> information
>
> - how can African countries start up a cert- through collaboration for
> example with existing CERTs
>
> - in establishing a culture of cybersecurity – consideration should be
> given to the fact that there are different social cultures in different
> countries however there is consensus on issues such as child pornography,
> identity theft
>
> - how can a regional approach be developed where there are differences in
> level of ICT infrastructure and use of infrastructure in the delivery of
> services, what tools can be used to encourage decision makers to be involved
> in the issues of cyber security?
>
> o It was recognised that funding and expertise was required for example
> AFDB, World Bank and Islamic Bank while ITU have regional workshops on cyber
> security
>
> o As African countries build on infrastructure and services – there is an
> opportunity to learn from those that have already developed CERTs.
>
> - How does the CERT monitor traffic: with the collaboration of ISP and
> operators as well as supporting legislation
>
> - Regulators need to advice the government to use ICT in development – this
> is a manifestation of government commitment
>
> - The role of policy making was emphasized – as it provides government
> commitment to using ICT for social economic development and governance and
> consequently support for cyber security initiatives – including the
> formulation of legislation.
>
> - There should not use a piece meal approach to cyber security to prevent
> ineffectiveness for example Mauritius has electronic transaction act but PKI
> not yet established
>
>
>
> On 12/5/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>>
>> Following our recent online discussions on Internet governance issues in
>> Kenya, the Kenya IGF and East African IGF; you may wish to follow the
>> discussion currently ongoing at the global IGF 2008 in Hyderabad India at
>> http://www.intgovforum.org.
>>
>> Below are highlights from workshops I attended on Day 1 December 3rd):
>> *0930-1100 hrs Workshop 43: Legal aspects of governance critical
>> internet Policy issues of public relevance*
>> *1st presentation*
>> The issues on that have legal implications include:
>> • internet security intellectual property rights, infringement, privacy
>> and protection mechanisms
>> • IP domain name protection, conflicts arising out of data and content
>> ownership privacy therefore increasing role of P2P in growth of internet 2
>> • Consumer status and rights in relation to e-commerce cross border and
>> domestic online trade
>> • Telecom issue viz backbone deployment and interconnection costs
>> • Freedom of expression – the extent of censorship and control on online
>> content
>>
>> There is need for capacity building to create meaningful participation of
>> individual and SMEs as well as increasing connectivity through building IXPs
>> and local content development
>>
>> The question was raised as to whether there a need of alternative
>> institutional mechanism.
>> The salient features of the MOU between ICANN and the department of
>> commerce (DoC) include:
>> - The affirmation of the role of private sector leadership
>> - The role of DoC in ensuring transparency and accountability and
>> effective GAC participation
>> - Ensure accountability and publish by-laws and strategic and operational
>> plans
>> - Agreement can be terminated in 120 days
>>
>> The MOU has been criticized because of the following reasons:
>> - US governmental control on root server administration
>> - Inconsistent with WSIS principle where no single government should have
>> a pre-eminent role
>> - Domain name allocation policies need better development
>> - IPv4 address allocation have been imbalanced need to ensure IPv6 address
>> allocation does not suffer the same effects -This assertion was however
>> refuted as IP addresses allocation based on need. The need for prudent
>> management and keeping barriers low for the transition to IPv6 was
>> emphasised.
>>
>> To overcome this WGIG proposed 4 models:
>> - Global policy council
>> - Intenational internet council with leading government role to fulfil the
>> ICANN/IANA functions
>> - GAC to be strengthened with enhanced coordination function
>> - Replace US govt role by general internet council or with world ICANN (in
>> lieu of GAC)
>>
>> The common features of these models were the overwhelming government lead
>> and the presupposition of the possibility of international treaties. During
>> the discussion the viability of these models was questioned given that speed
>> is of essence in the management of internet resources. It normally takes a
>> long time to negotiate international agreements; including treaties instead
>> a set of principles should be endorsed.
>>
>> The speaker recommended on the management of critical internet
>> infrastructure should take into consideration the following
>> • Treatment of technical resources of the internet and global economic,
>> social and legal aspects arising out the internet should be at par
>> • The development and implementation of polices and standards and
>> solutions to various internet issues should be done in a coordinated manner
>> for example telecommunication standard development is done in a hierarchical
>> and predictable way.
>> • New structure would be a supreme authority over internet
>>
>> In conclusion the speaker asked: Does the internet as we know it need to
>> be altered radically? Should the status quo be maintained? Should a Red
>> Cross model of recognition by international community states be given to an
>> international entity like ITU, INTELSAT. However fundamental change is not
>> necessary as failure has not been identified.
>>
>> *My comment*: this presentation was descriptive and despite the fact that
>> an alternative model was proposed the principles, mechanisms that would need
>> to be put in place in order to make it work were not discussed
>>
>> *2nd presentation*
>> The next speaker spoke about the ccTLDs in latin Amercia which are broadly
>> organised into two main groups: non-governmental and governmental
>> organisations. A contribution from the floor however clarified that the
>> Brazilian ccTLD is a multi-stakeholder – coordinated by government – but on
>> a day by day basis operates as a non-governmental organisation. The Indian
>> ccTLD is managed by government and private sector – sovereign interest taken
>> care of through government representation.
>>
>> The rules and regulations under which the institutions that manage the
>> ccTLDs are managed determinate legal framework under which they operate.
>> Consequently ccTLDs are regulated under national law while ICANN regulates
>> gTLDs – The possibility of self regulation is based on the assumption that
>> private sector would act in the public interest.
>>
>> In the discussions some felt that there was need for increased attention
>> of government in the management of ccTLDs – as it was critical
>> infrastructure while on the other hand other felt that there was the risk of
>> excessive regulation with increased involvement of government.
>>
>> *1130 -1200 hrs Workshop 36: Strategies to prevent and fight child
>> pornography in developing countries*
>> Child pornography in Brazil has grown out of the popularity of social
>> networking. However the main challenge has been issues related to
>> jurisdiction as content is resident in ISP based in the USA and
>> trans-national ISPs like Yahoo, Microsoft and Google which have branches in
>> strategic markets and have tailored the services for these markets in terms
>> of language and content.
>>
>> Brazil was therefore unable to deal with serious offences related to
>> content – specifically child pornography - committed by Brazilians using
>> Brazilian IP addresses. The government has been able to sign an agreement
>> with Google to fight child pornography on Google's orkut social network.
>>
>> The following are consideration taken in drawing up the agreement
>> 1. Which criteria should be used to define the ability of a particular
>> country to legislate over and sanction conducts committed on the internet?
>> - Where the data is located?
>> - International law principles (territoriality or nationality) shall be
>> used to define the sovereignty of a state regarding – cyber space – which is
>> a network of networks
>> - Define some reasonable standard – for example managed by Brazilians and
>> is local content and local language
>> - Access points in Brazil, harmful conduct felt in the country – taken
>> obligation under international law to take offence – country of origin
>> approach would force thousands of users to unfamiliar rules and travel –
>> offence under human rights therefore apply local legislation
>>
>> 2. It is legitimate to enforce the conduct of local office –as it
>> impracticable to send legal request to the US.
>>
>>
>> New tools have been implement that have reduced number of images uploaded
>> and increase in number of reported cases- subject to investigation. It was
>> inspiring to listen to parliamentarian talk about the need to have
>> legislators engaged in the process as they ultimately pass the laws. I
>> appreciated the fact that in there is great cooperation between the
>> parliament, government, police, civil society and private sector.
>>
>> The main challenges are:
>> • Lack of awareness and participation by parliamentarians who are critical
>> in the formulation of legislation
>> • how to obligate ISPs to provide information without infringing on
>> freedom of expression and privacy,
>> • what criteria should be used to deal with these offences
>> • the creation of awareness of ISPs in developing countries of the need
>> for judicial cooperation as well as social initiatives to deal with cyber
>> crime.
>> • Insufficient infrastructure to deal with this issue – law enforcement
>> does not have the human resources and technology
>> • Material produced to fight child pornography are not evaluated – they
>> should be inline with the demand
>>
>> *My comment*: I would have like to know if initiatives have reduced
>> offences, what is the success rate registered in prosecution, ability of the
>> law enforcement and judicial system to deal with offences. There was no
>> mention of where initiatives had been launched to fight child pornography on
>> the financial front.
>>
>>
>> *1530-1700 Workshop 45: Opening to diversity and competition of the DNS
>> system*
>>
>>
>>
>> There were 3 presentations in this session:
>>
>>
>> - *1st presentation* - alternate DNS system used in library systems
>>
>>
>> - *2nd presentation* - implementation of security in the Handle system
>>
>>
>> - *3rd presentation –* discussed the Net4D
>>
>>
>>
>> Net4D- provides the technical solution to the political concern on the
>> control of root servers. Net4D networks enable the following:
>>
>> • Empower the second generation of the web: the semantic web.
>>
>> • Multi-stakeholder governance of DNS
>>
>> • Net4D classes should be open and interoperable
>>
>> DNS 1.0 – was a monopoly of ICANN web 1.0 html with USA parentage and
>> English only while DNS 2.0 is open allowing for competition including inter
>> alia:
>>
>> • Net4D semantic web
>>
>> • Open coherent approach to linguistic diversity
>>
>> • Allow technological innovation with value added services
>>
>>
>>
>> Concern was however raised on the:
>>
>> • Investment/implementation cost required to implementation of different
>> DNS systems depending on the BIND implemented and root servers enabled
>>
>> • relinquishing of the political control of root servers
>>
>> • Value to end users
>>
>> • Awareness and understanding of the issues by different stakeholders
>> necessary – delivered in a way that they can understand
>>
>>
>>
>> *My comment*: the session was technical – I hope the techies on the
>> mailing list can help us understand the governance issues associated with
>> the introduction of DNS competition and the impact on developing countries
>> :)!
>>
>>
>>
>> Kind regards
>>
>> mwende
>>
>
>
1
0
Dear All,
Could we comment on the presentation that Brian (a Kenyan) made at the IGF
currently taking place in Hyderabad. It was an excellent presentation on
access befitting the theme of the forum: "Internet for all" and he has
done us proud.
It is also great to have quite a large Kenyan delegation at this India IGF
contributing Kenyan specific IG issues. The IGF is a process/event/forum
that had not received enough attention both at the national and regional
level.
---------
I will also take this opportunity to remind listers of some of the
KICTAnet mailing list rules:
* Please mind your manners:
* Be polite - virtual members are real not a cyberspace borg with no
feelings.
* Watch your words. Kick the bad language - People are listening.
* Laws are laws - Whats real in the real world are the same in
cyberspace.
* Dont send rude or offensive e-mails or postings.
* Be ethical in your posting. Don't lie, plagiarize, defame, or
deliberately do harm to another KICTANet forum user.
If you are not able to respect these simple rules...the KICTANet
administrator will have no choice but to suspend you!
best
alice
Binaifer Nowrojee wrote:
>
> For those who have not read this opinion piece, I would urge you to do
so and reflect on it. Why do we need to bring down Brian Longwe on the
basis of his nationality? Why not celebrate his success? Why assume
that a non-Kenyan will not positively contribute to Kenya?
>
> Best
>
> Binaifer Nowrojee
>
>
>
> Barack Obama and the graveyard of hope
>
> Wambui Mwangi (2008-08-11)
>
> http://www.pambazuka.org/en/category/comment/50078
>
> Printer friendly version
>
> There are 2 comments on this article.
>
> I am finding it very difficult to join in the jubilation about Senator
Barack Obama. Not that I want to deny the man his victory, but my
impulse to celebrate keeps deflating on the idea that the best thing
that happened to little Barack was not growing up in Kenya.
>
> I have been imagining alternative trajectories for him if he had come to
know the world through the eyes of a Kenyan citizen, if his mother and
grandparents had not rescued him from our chaos and contradictions and
brought him up somewhere his intellect and talent could grow.
>
> If he had grown up here, and had he somehow managed to retain most
elements of his current self, he would have been another outstanding,
intelligent and competent Luo man in our midst: and he would have been
killed.
>
> Yes, we would have assassinated a Barack Obama if he had remained ours,
with us, one of us here in this schizophrenic cauldron we call home.
This is not going to stretch the imagination of any Kenyan - after all,
when we had that incredibly good-looking and charismatic home-grown
hero, Tom Mboya, we shot him to death.
>
> And when that austerely intellectual and elegant leader, Robert Ouko,
threatened to look overly intelligent to the world, we killed him too.
We killed Pio Gama Pinto and we killed JM Kariuki. There is no reason to
suppose that Barack Obama, whose integrity of purpose and stringent
sense of ethics even his enemies concede, would have survived his Kenyan
roots.
>
> He is much too intelligent, too charged with the promise of history, too
bold in his claim to a shining destiny, too full of the audacity of
hope, for us to have let him survive. Kenya would have killed Barack
Obama, or at least his dream, as we inevitably destroy, in one way or
another, the best and the boldest of us. Goldenberg whistle blower David
Munyakei's challenge to his country to be bigger than our greed was met
with a whimper, and then with rapid abandonment. We did not deserve him,
either.
>
> As for John Githongo, he should have known better than to take the idea
of public ethics seriously - this is Kenya, after all. Let him enlighten
people at Oxford instead; such considerations are too virtuous for us,
too sensible, too conducive to a promising future. We do not even remark
on the haunting wastage of all this shining accomplishment - Micere Mugo
sings her lyrical poetry for Americans, and we do not even know enough
to mourn the loss.
>
> And yet we are all enchanted with the power of the idea of Barack Obama,
the hope of him, the beauty of his life's trajectory, the universe of
possibilities and probabilities that it conjures for the least of the
rest of us. If someone's cousin's friend's neighbour makes it to the
United States... then we all have a chance. We have a strange
predilection for schizophrenic loves and loyalties; we let geography
dictate our alliances and imaginary lines decide our friends. It is as
if our social contract states that here, at home, we are obliged to
behave like fighting rats to each other but when abroad, when released
from the shackles of kin and clan and conclave, we can fly and soar and
master the sky.
>
> When Wangari Maathai is abroad, we feel that her Nobel Prize is partly
represented in each of our Kenyan living rooms; when she comes home, she
is just another Kikuyu politico. We preen about our athletes winning yet
another international competition to anybody who will give us half a
chance, but when they are at home we turn them into more fodder for
militias.
>
> Caine Prize winners are Kenyan by automatic assent, but Binyavanga
Wainaina is a Kikuyu writer when at home and Yvonne Owuor is indelibly a
Luo - we shrink them to fit the midget-sized visions we have of
ourselves.
>
> It is clear to all of us, and the evidence continues to accrue, that we
have, collectively, a certain global competence, as Kenyans, that we
produce individuals of substance and historical purpose.
>
> Being Kenyan, however, we prefer to drown in the pettiness of our
parochial quarrels when at home, and if one of us threatens to be too
hopeful, too ambitious, too intelligent, too creative or too
inspirational to fit into our trivial little categories of hatred and
suspicion, we kill them, or exile them from our societies, or we just
cause them to run away inside, hiding from us and from themselves the
grandeur of their souls, the splendid landscapes of their imagined
tomorrows.
>
> Nothing but the worst for us, at home. We recognise each other by our
most rancid rhetoric. We insist upon it, we cultivate it, we elevate it
to an art form: Kenyan, and quarrelsome.
>
> Kenyan, and clannish. Kenyan, and counter-productive. Kenyan, and
self-destructive. Kenyan, and consistently heart-breaking. Genius
everywhere, and not a thought to be had. Promise and potential
everywhere, and not an opportunity to be had. Money everywhere, and not
an honest penny to be earned. Helicopters aplenty, but no help for the
needy. A land awash in Cabinet ministers and poverty.
>
> I have been watching Kenyans getting high on Obamamania, and I am
wondering what we are so happy about? It is perhaps that we are
beginning to acknowledge what we should always have known - given a half
a chance, an ever so slightly conducive context, Kenyans are more likely
to over-achieve than not. At the faintest provocation, Kenyans will leap
past expectations without breaking their stride or breaking a sweat,
especially if they happen to have escaped the imprisoning edifice we
call home and found foreign contexts to flourish in, no matter how
alien.
>
> I went to a town in the Canadian Arctic once, in the far north, where in
summer the sun shines even at midnight and in the winter the world is an
endless landscape of ice and snow. Here, far, far away from home, where
nothing was familiar except the gentleness of elderly Inuit women and
the comforting weirdness of the white residents, I was told that the
local dentist had, for many years, been a Kenyan. Everybody said he had
been an excellent dentist, out there in the desert of the cold. I was
unsurprised.
>
> We are an adventurous people, we Kenyans, and we take to the world
outside our home as if born to a conquistador culture - we are brave and
brash and bold, out there. We buy and sell things, and make money at it,
out there. We go to school and excel and cover ourselves with
accreditations, out there. We win things, out there. We get prizes, out
there. We are at our best, out there.
>
> However, at home, for some reason we refuse to either acknowledge or
examine - we have chosen simply to set aside this capacity. Here, at
home, nothing but the very lowest common denominator will do; nothing
but the basest and most brutal aspects of our selves are to be presented
to each other; nothing but the most cynical manipulation is the basis of
our political space. We prefer to be ruled by individuals whose
mediocrity is matched only by their mendacity, here at home.
>
> We prefer to abdicate our adult responsibilities and capacity for reason
to "leaders" whose lack of virtue is as legendary as our attractively
exotic pastoralists. We do not only waste talent, here at home - we go
out of our way to suppress and repress it. We do not only deny dreams,
here in Kenya - we devour them, and ask each other, "Who do you think
you are?" As if the success of another is an affront.
>
> In Kenya, grand vision and soaring imagination is illegitimate; here,
they just call you naive. Out there, you stand a chance of becoming a
hero; at home, you will have nothing but the taste of ashes in your
mouth. Mothers, take your children abroad.
>
> Barack Obama has written two books, in which he discusses ideas. Ideas.
This is a man with vision and conviction, and enough good ideas that
even those who do not like the pigmentally-advantaged are listening, and
changing their minds.
>
> Even those who think that his name sounds suspiciously like a
terrorist's are reading his books and listening to his speeches, and
changing their minds. This is a man with interesting and inspiring
things to say - which disqualifies him from any Kenyan-ness we would
have liked to claim.
>
> Americans like the image of them that Barack Obama has painted in words;
which Kenyan leader would dare to build dreams bigger than his roots?
Which Kenyan leader would ever be so foolish as to attempt inspiration
instead of instigation?
>
> Barack Obama has seduced the world by the power of his persuasiveness,
and while Kenyans raise another glass to the accomplishments of "one of
our own," it seems clear to me that we gave up our rights to him when we
gave up our hopes for ourselves. When we settled for incompetence, and
corruption, and callousness, we defined ourselves out of his universe,
and out of his dreams.
>
> We rejected Barack Obama-ness when we allowed those pangas to slash our
dreams, when we watched our hopes spiral away in smoke. We allowed the
ones who had done this to become the only mirrors of ourselves, and then
squelched our disgraced selves back to the mire of our despondency.
>
> Barack Obama cannot be a Kenyan, and Kenyans cannot grasp Barack Obama's
dream. We have already despaired of it, and of ourselves. His dream
would have died with ours, here at home, here in the graveyard of hope.
>
> But oh, how we yearn to see ourselves reflected in his eyes...
>
>
> *Wambui Mwangi is an assitant professor of Political Science at the
University of Toronto, Canada. This article first appeared inThe East
African, June 15 2008.
>
> *Please send comments to editor(a)pambazuka.org or comment online at
http://www.pambazuka.org/
>
>
>
>
> _______________________________________________
> kictanet mailing list
> kictanet(a)lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>
> This message was sent to: alice(a)apc.org
> Unsubscribe or change your options at
http://lists.kictanet.or.ke/mailman/options/kictanet/alice%40apc.org
8
9
Hi all,
We talk of the big 5 that bring large chunks of foreign currency through tourism, we shamelessly exploit a resource we played no part in developing. Could this be why we cannot create local content and just seat back and hope that the marine cable will bring cyber tourism just like airports brought millions to see the big 5.
I ask, we keep raising the issue of generating local content and yet we still are not making the effort to do it, can someone out there, for example, put online a comprehensive database of schools and colleges that can be easily accessed from anywhere in the country? I remember being given a yellow coloured career booklet when I was in Form 4 which listed all the governments colleges and institutions of learning ranging from tailoring to engineering. Is there no way to take such a booklet, update it and make it instantly available from Lamu to Wajir (not forgetting Chepalungu).
This would at least encourage domestic cyber tourism thus keeping some traffic local, while seriously thinking of what we could provide to foreign cyber tourists. Can we encourage our youth & mentally alive older geeks to come up with a thinggy (for lack of a better phrase e.g what would you have called facebook before facebook) that can drive traffic to Kenya.
ICTBoard find some loose change somewhere to show case serious application ideas nothing like what is domonstrated at the IEEE exhibition (too much cut & paste), lets become venture capitalists (that sounds hip) maybe we can give DJ. CJ a new pet project.
After the post election what which when who where, it might would help the healing to place our diverse cultural practices online so that I can use the tool I understand and respect, the web, to better understand other ethnic groups. Now this could be a cyber tourism puller, maybe even create online villages that someone can become a member of thus learn about the tribe. Develop online language training programs of our various languages which cyber citizens can then learn to better understand the tribes. Our strength is in our diversity let milk it to our benefit.
It is interesting how as kenyans we are aware a problem &know the
solution but for some unexplainable reason we still proceed to the
illogical end. I am a true Kenyan.
There is a very good
Robert Yawe
KAY System Technologies Ltd
Phoenix House, 6th Floor
P O Box 55806 Nairobi, 00200
Kenya
Tel: +254722511225, +254202010696
________________________________
From: Joseph Manthi <jmanthi(a)gmail.com>
To: robert yawe <robertyawe(a)yahoo.co.uk>
Sent: Tuesday, 9 December, 2008 18:15:57
Subject: Re: [kictanet] 1 million Laptops for who?
Robert
Very well said.
1. I agree totally that the Ministry should consider equiping students of the various public universities with laptops that they can take home at the end of their school year, After all these are the very best and brightest Kenya has to offer. One of my former high school classmates told me that the Very Brightest went to the University of Nairobi and the rest went to India, US, Canada, UK and other places according to how deep pocketed your tall relatives were.
2. Secondly, to encourage entrepreneurship shouldn't the ministry in conjunction with the ministry of commerce (I am dating myself?) to build and supply the laptops in Kenya. PCs are now commodities that can be locally assembled.
3. If you agree with 2 above, have African (Kenyan) entrepreneurs build them in rural areas.
My 2 cents.
Joe
On Tue, Dec 9, 2008 at 2:15 AM, robert yawe <robertyawe(a)yahoo.co.uk> wrote:
Hi Dr. Ndemo,
I felt it would not be fair to close the year with one final outburst on your ministries policies.
It was good to see that the governement will be giving laptops to youth in the rural area. http://www.nation.co.ke/business/news/-/1006/499894/-/jh30hdz/-/index.html
Last time I checked 80% of the students in the University are from the "rural areas" would it not make more sense to first equip them with the necessary tools. I recently talked to IT degree students at Nairobi university and was shocked to find that less than 5% have computers dedicated to them and this are not provided by the institution but have been bought privately.
It is good to talk of empowering the rural folk but is this the best way, should we not begin at the top and work our way down. This computers would also provide greater mileage if we example they where to be giving to to students in teacher training colleges so that they can take technology to the schools, country wide that they will be posted to after they graduate?
Also do not forget the medical students who would be able to provide better medical services if they knew how to use and had access to the internet's resources.
Another major issue that is lacking from the story is how the laptops are to be procured, is there any likelihood that they will be assembled locally as if they are we shall be killing to birds with 1 stone.
Robert Yawe
KAY System Technologies Ltd
Phoenix House, 6th Floor
P O Box 55806 Nairobi, 00200
Kenya
Tel: +254722511225, +254202010696
_______________________________________________
kictanet mailing list
kictanet(a)lists.kictanet.or.ke
http://lists.kictanet.or.ke/mailman/listinfo/kictanet
This message was sent to: jmanthi(a)gmail.com
Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/jmanthi%40gmail.com
--
Joseph Manthi
CEO
MEO Ltd
http://www.meoltd.com
2
1
Hi Dr. Ndemo,
I felt it would not be fair to close the year with one final outburst on your ministries policies.
It was good to see that the governement will be giving laptops to youth in the rural area. http://www.nation.co.ke/business/news/-/1006/499894/-/jh30hdz/-/index.html
Last time I checked 80% of the students in the University are from the "rural areas" would it not make more sense to first equip them with the necessary tools. I recently talked to IT degree students at Nairobi university and was shocked to find that less than 5% have computers dedicated to them and this are not provided by the institution but have been bought privately.
It is good to talk of empowering the rural folk but is this the best way, should we not begin at the top and work our way down. This computers would also provide greater mileage if we example they where to be giving to to students in teacher training colleges so that they can take technology to the schools, country wide that they will be posted to after they graduate?
Also do not forget the medical students who would be able to provide better medical services if they knew how to use and had access to the internet's resources.
Another major issue that is lacking from the story is how the laptops are to be procured, is there any likelihood that they will be assembled locally as if they are we shall be killing to birds with 1 stone.
Robert Yawe
KAY System Technologies Ltd
Phoenix House, 6th Floor
P O Box 55806 Nairobi, 00200
Kenya
Tel: +254722511225, +254202010696
1
0
Good Afternoon KICTANET Moderator.
This forum has been very benefital to use when it comes to matters and issues of ICT. However, during the last few weeks its lost value as most of the comments that are flooding our inboxes are witch haunts by a selected few individuals. I urge you to filter this from your mailboxs. I see majority of subscribers asking removal from your mailing list.
Am sure you have seen what has happened and I hope you are doing something about it.
Thanks
Stephen Mwangi
5
8
*Do more. A lot more. Technical Internship Opportunities at Google EMEA
*
Here at Google, we're not looking for people who will just localise
technologies developed in other countries, nor simply engineers focussed on
improving infrastructure. What we are looking for are people with
outstanding technical skills, creativity, potential and passion who can help
invent end-to-end technologies from scratch; stuff that will interest and
inspire millions of users across the world.
During an internship with us you'll have the opportunity to contribute to
projects in a direct and meaningful way. We're taking into account your
skills and interests when determining which of our small and dynamic teams
you will be joining. Your pre-assigned host will find projects that are
right for you and work closely with you during your time with us.
We're confident that an internship with us will be a rewarding experience
that will develop your ability to programme at a global scale, deepen your
understanding of Computer Science and allow you to connect with outstanding
people from all over the world.
Your internship will most likely take place in our engineering centre
in Zurich,
Switzerland<http://www.google.com/support/jobs/bin/static.py?page=studentseu.html&sid=z…>.
If you are accepted for an internship, you'll need to move for the duration
of your time with us and we'll gladly help you with all the logistics (visa,
accommodation) related to this move.
Start and end dates of Google Engineering internships are flexible, with a
minimum duration of three months. Internships are typically full-time
positions, are paid, and take place year-round.
*The ideal intern profile for Google*
To be eligible for an internship, you should be enrolled in a BS, MS or PhD
in Computer Science or a related technical field and be within 12-18 months
of completing a Bachelor's or Master's degree, or at any stage in your PhD.
Please note that you should be returning to university after the end of your
internship, or the internship should be a formal part of completing your
studies.
The following are also key requirements:
- Experience in systems software or algorithms.
- Excellent programming skills (C++; Java and/or Python).
- Knowledge of UNIX/Linux or Windows environments and APIs.
- Familiarity with TCP/IP and network programming a plus.
- Fluency in English
*How to apply? *
We welcome applications from students to spend an internship with us at one
of our European offices and review applications on an ongoing basis. To
maximise your chances of success we'd encourage you to apply as soon as
possible, and 4 months before the desired start of your internship at the
latest. The following
link<http://www.google.com/support/jobs/bin/answer.py?answer=112436>will
lead you to our online job site through which you can submit your
application. Please submit your application for the *Software Engineer
Intern - Europe* position only as it will allow us to process your
application without delay.
Your application should contain the following documents:
- An up-to-date CV
- University transcripts/grades (unofficial is fine, including your GPA
if possible)
- A cover letter stating your graduation date and when you would be
available for an internship (minimum 3, maximum 12 months)
If you like more information about preparing your CV, please have a look at
our Preparing your
CV<http://www.google.com/support/jobs/bin/static.py?page=studentseu.html&sid=r…>section.
*Should you have any questions or experience technical difficulties
submitting your application, please contact us directly at
africa-interns-2009(a)google.com*
1
0
Sure Zacheus,
Thanks for your work. We always follow with implementation. Thats our work.
The only way to move beyond the meeting/committee rooms. Which is what you
expect.
On Mon, Dec 8, 2008 at 4:08 PM, Zacheus Mwatha <zimwatha(a)kebs.org> wrote:
> Dorcas,
>
>
>
> Kindly let's walk the talk.
>
>
>
> Kind regards.
>
>
>
> *Mwatha Z I (Mr.)*
>
> *Kenya Bureau of Standards*
>
> *KEBS Centre, Popo Road, off Mombasa Road, Behind Bellevue Cinema*
>
> *P.O. Box 54974 — 00200 Nairobi, Kenya*
>
> *ISDN: +254 (0)20 6948270*
>
> *Tel: +254 (0)20 605490, 6948000, (0)722 202137*
>
> *Fax:+254 (0)20 609660, 604031*
>
> *Other E-Mail: mwatha_zacs(a)yahoo.com <info(a)kebs.org>*
>
> *Personal Cellphone: +254 (0)722 368998*
>
> *__________________________________________________________ **
> *
> *"Quality products for quality life"*
>
>
>
> *Disclaimer*
>
> This e-mail and its attachments are confidential, private and intended for
> the addressee only. Should you not be the addressee and receive this e-mail
> by mistake, kindly notify the sender, and delete this e-mail, immediately
> and do not disclose or use same in any manner whatsoever. Views and opinions
> expressed in this e-mail are those of the sender unless clearly stated as
> those of KEBS. The Bureau accepts no liability whatsoever for any loss or
> damages whatsoever and howsoever incurred, or suffered, resulting, or
> arising, from the use of this email or its attachments. The Bureau does not
> warrant the integrity of this e-mail nor that it is free of errors, viruses,
> interception or interference. For information about Kenya Bureau of
> Standards visit our website at http://www.kebs.org
>
>
>
> *From:* Dorcas Muthoni [mailto:dmuthoni@gmail.com]
> *Sent:* Jumatatu, Decemba 08, 2008 1:36 PM
> *To:* Gakuru Alex
> *Cc:* Zacheus Mwatha; KICTAnet ICT Policy Discussions
> *Subject:* Re: [kictanet] ADOPTION OF ISO/IEC 26300 AND ISO/IEC 29500
>
>
>
> Dear All,
>
> As documents and services are increasingly transformed from paper to
> electronic form, there is a growing problem that governments and their
> constituents as well as private enterprises may not be able to access,
> retrieve and use critical records, information and documents in the future.
> To enable the public and private sector to have greater control over and
> direct management of their own records, information and documents, it is
> important that we adopt and advance the use of the OpenDocument Format
> (ODF).
>
> It is important that all policymakers, IT administrators, decision mankers
> (for both public and private) advance the benefits and opportunities of the
> OpenDocument Format, to help ensure that government and private enterprise
> information, records and documents are accessible across platforms and
> applications, even as technologies change today and in the future.
>
> Thanks to KEBS for moving Kenya forward on this.
>
> Kindly take two minutes to review and complete the document for adoption.
> Most importantly, remember to submit your signed form back to KEBS.
>
> Thanks Alex for sharing this.
>
> Regards,
> Muthoni
>
> On Mon, Dec 8, 2008 at 1:05 PM, Gakuru Alex <alexgakuru.lists(a)gmail.com>
> wrote:
>
> All,
>
> I am forwarding this as requested on the message body.
>
> Please direct any inquiries to the KEBS staffer copied.
>
> Sincerely,
>
> Alex Gakuru
>
> PS:
> Walubengo is copied to ensure this larger-than-40k post gets bounced.
> AG
>
>
> ---------- Forwarded message ----------
> From: Zacheus Mwatha <zimwatha(a)kebs.org>
> Date: Thu, Dec 4, 2008 at 10:01 AM
> Subject: ADOPTION OF ISO/IEC 26300 AND ISO/IEC 29500
> To: Zaheda Bhorat <zaheda(a)google.com>, Zacheus Mwatha
> <zimwatha(a)kebs.org>, jsevilla(a)strathmore.edu, JOHNSONM(a)za.ibm.com,
> cakunga(a)virtualcity.co.ke, chetan(a)skytechafrica.com,
> dofisi(a)cskonline.org, dkamiri(a)kenyalaw.org,
> michael.owuor(a)manageworks.co.ke, sammy(a)skytechafrica.com,
> mail(a)cskonline.org, bremack1(a)yahoo.com, iondieki(a)vegasoftware.com,
> peterk(a)sdae.co.ke, sammynjuguna(a)hotmail.com, edgar.kioga(a)wfp.org,
> keziah(a)cskonline.org, jkimilu(a)icsit.jkuat.ac.ke,
> samuel.kuria(a)kenya-airways.com, Emmanuel.Birech(a)microsoft.com,
> emailsignet(a)mailcan.com, edgar.okioga(a)gmail.com, pmwele(a)gmail.com,
> csk(a)nbi.ispkenya.com, vawuor2001(a)yahoo.com, waiganjo(a)uonbi.ac.ke,
> Jeremy Allison <jra(a)google.com>, Joseph Mucheru <jmucheru(a)google.com>,
> Gakuru <gakuru(a)gmail.com>, Lucy <lucym(a)za.ibm.com>, Okoth Monica
> <okothm(a)kebs.org>, Wambua Amos <wambuaa(a)kebs.org>
> Cc: mwatha_zacs(a)yahoo.com
>
>
> Dear Sir/Madam,
>
>
>
> There are requests which have been received to adopt the above two
> international standards.
>
>
>
> Attached are self explanatory letters and adoption proposal forms
> which you are kindly requested to complete and return to us for
> processing. Kindly note that the form MUST BE SIGNED AND STAMPED
> otherwise it won't be taken into account during processing. You are
> free to use any mode of transmission (fax/email/post/hand
> delivery/etc) as long as the forms reaches us not later than the due
> date. Any ballots received after the deadline will be disregarded.
>
>
>
> You are free to forward this information to as many stakeholders as
> possible since we need a national response to this matter.
>
>
>
> Finally, if you forward to any stakeholder or group of stakeholders,
> kindly copy me the mail so that i may have a database of all those
> that received the information (if you use bcc it won't be of much help
> to me).
>
>
>
> Kind regards.
>
>
>
> Mwatha Z I (Mr.)
>
> Kenya Bureau of Standards
>
> KEBS Centre, Popo Road, off Mombasa Road, Behind Bellevue Cinema
>
> P.O. Box 54974 — 00200 Nairobi, Kenya
>
> ISDN: +254 (0)20 6948270
>
> Tel: +254 (0)20 605490, 6948000, (0)722 202137
>
> Fax:+254 (0)20 609660, 604031
>
> Other E-Mail: mwatha_zacs(a)yahoo.com
>
> __________________________________________________________
> "Quality products for quality life"
>
>
>
> Disclaimer
>
> This e-mail and its attachments are confidential, private and intended
> for the addressee only. Should you not be the addressee and receive
> this e-mail by mistake, kindly notify the sender, and delete this
> e-mail, immediately and do not disclose or use same in any manner
> whatsoever. Views and opinions expressed in this e-mail are those of
> the sender unless clearly stated as those of KEBS. The Bureau accepts
> no liability whatsoever for any loss or damages whatsoever and
> howsoever incurred, or suffered, resulting, or arising, from the use
> of this email or its attachments. The Bureau does not warrant the
> integrity of this e-mail nor that it is free of errors, viruses,
> interception or interference. For information about Kenya Bureau of
> Standards visit our website at http://www.kebs.org
>
>
>
> --------------------------------------------------
> This message has been scanned for viruses and
> dangerous content by Jambo MailScanner, and is
> believed to be clean.
> --------------------------------------------------
> "easy access to the world"
>
> _______________________________________________
> kictanet mailing list
> kictanet(a)lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>
> This message was sent to: dmuthoni(a)gmail.com
> Unsubscribe or change your options at
> http://lists.kictanet.or.ke/mailman/options/kictanet/dmuthoni%40gmail.com
>
>
>
>
> --
> Muthoni
>
> My Blog: http://rugongo.blogspot.com/
> --------------------------------------------
> Mahatma Gandhi once said:-
>
> First they ignore you,
> Then they laugh at you,
> Then they fight you,
> AND THEN YOU WIN!!!
>
> --------------------------------------------------
> This message has been scanned for viruses and
> dangerous content by *Jambo MailScanner* <http://www.mail.jambo.co.ke/>,
> and is
> believed to be clean.
> --------------------------------------------------
> "easy access to the world"
>
--
Muthoni
My Blog: http://rugongo.blogspot.com/
--------------------------------------------
Mahatma Gandhi once said:-
First they ignore you,
Then they laugh at you,
Then they fight you,
AND THEN YOU WIN!!!
1
0
*5th December 2008*
*930-1100 Panel Discussion Transition from IPv4 to IPv6*
Based on several studies it is projected that IPv4 addresses will be
globally exhausted by 2011 however address space will still be available at
a local level. Seamless take up of IPv6 is expected with the exhaustion of
IPv4 and there is on going discussion – to define policy to facilitate
smooth transition for operators and ensure that new comers have minimum IPv6
address space allocation to start up business.
The following issues were discussed from different perspectives:
*Issues from operators' perspective*:
- Deployment of IPv6 enabled equipment in the core networks should be done
increment – however uptake is low because there is no extra revenue
generated with the implementation of IPv6 i.e. the lack of commercial
drivers. However this is expected to change with the as customer numbers
grow.
- Need for upgrade – therefore operators from developed countries stand at
an advantage as they have the resources and are nearly exhausted their local
allocations.
- Getting operational experience is a challenge – there is need to invest in
operational tools to run IPv6 in terms of software configuration utilities
management and trouble shooting
- Participation in standardization – where users have equipment that
supports only IPv4 – how do they access services that are available only on
IPv6-based networks? The IETF is working on the transition mechanisms
however the co-existence of both protocols is expected for a long time
- Operators are pushing for IPv6 support in customer premise equipment (CPE)
as well as software that supports the new protocol version. However it is
expected that legacy applications will be available in the foreseeable
future
*Issues from a vendor perspective*
- Transition has been going on for some time in the vendor world. The
transition has been a long process for vendors and operators – in terms of
getting the technology and standards ready
- As IP is the core of the internet – transition to ipv6 – is significant
particularly with the increase of IPv6 enabled devices connected to the
internet specifically mobile phones
- need to understand technology and therefore need for operational and
implementation experience
- managing customer demand/expectations for IPv6 enabled services and
devices
- cost of staff training
- there are mistakes that will be made – therefore need for mutual support
in the implementation of v6
*Social and economic perspectives*-
- Transition should be cooperative endeavour with social and economic and
policy considerations
- Gradual implementation and interoperability between IPv4 and v6 expected
so as to preserve the investment already made
- There is a general understanding that IPv6 will compliment and supplement
the existing IPv4 as well as provide improved routing, multicasting,
efficient infrastructure. The following questions however arise:
o The advantages that IPv6 offer are good reasons to invest in the new IP
version.
o Would transition be transparent and would backward compatibility required
- Users want the stability of the internet to be maintained and hope that
IPv6 will offer opportunities for addition to personality features on the
internet – this is what makes the business case
- In the India case there are a large number of service providers – and
there is only a 1/8 usage – therefore demand is low – the need to enhance
cultural diversity however provides opportunities to create demand through
local content development including E-government programme and Info-tainment
- It is important to break the myth that IPv6 is a new internet - It is not
a new internet rather continuation of the internet
- The main benefit is the address space addition- which may allow for
efficiency
- There is no need to establish a deadline or regulate the implementation of
IPv6 – as it will be market driven. Additionally users should have rights to
use IPv4 and IETF is working on coexistence
*Policy perspective*
- With the impending exhaustion of IPv4 – further implementation will be
problematic – as not all players will support transition therefore it is
important to examine measures – for continued use of IPv4 and possible
migration of users to private IPv4 address space
- creation of action plan to be implemented by 2010 – for example offering
of incentives such as tax exemption and capacity building
- examination of existing programmes and mechanisms
- establishment of taskforce of IPv4 exhaustion
- the messages of ISPs is that they must carry IPv6
- IPv4 scarcity and demand for more security are the 2 major challenges
driving the uptake of IPv6
- Institution of market transfer or reclamation mechanisms of IPv4 resources
not required by local internet registries to the regional internet
registries when transition to IPv6 is implemented. However this would be a
challenge as RIRs have no contractual authority this may create a grey
market. This challenge may be overcome through a loose membership
association that allows others to use others resources
- Institution of secure routing objects including PKI to authenticate users
raises governance/control issues – RIRs have centralized control which may
make it efficient and better able to address security issues this makes an
RIR an central governance institution. Membership of security/government
associations in the RIR would result in infiltration of technical, policy
agendas that may make the transition to IPv6 complicated
- However it is argued that RIRs should remain neutral and trans-national
institutions which:
o maintain a homogenous technical group
o maintain a bottom-up approach in policy making
o guarantee the stability of the internet and business continuity of members
- main challenges in the deployment of IPv6 include:
o lack of public education, information and skill
o limited network policy decisions to make deployment happen
o lack of incentive to deploy ipv6
*1100-1230 Workshop 59:Building a global capacity building curriculum
framework and premier*
- Integration of IG capacity building in existing ICT and public policy
courses was advocated.
- The training may be offered either online, offline or through short term
executive courses.
- Collaboration between different stakeholders who have different needs is
imperative in order create an understanding of the issues arising from
increased used of the internet particularly those that transcend the
geographical, and cultural borders.
- internet security awareness programme set up in India
- Presentations on the Diplo IG capacity building programme (
www.diplomacy.edu/ig) – including a demonstration of the online platform.
- The Diplo approach includes the training course (foundation and advanced),
policy research, policy immersion and community interaction.
- The impact associated with the IG capacity building programme have been
varied and impressive including the establishment of IG governance masters
programme in Srilanka and the use of telecentres to disseminate IG related
information.
- Diplo has successfully offered the training to professional worldwide for
the last 4 years leading to the establishment of national, regional and
global community
*1400-1530 Workshop 29: Building confidence and security in the use and
security in the use of ICTs for African countries
*Main challenges in Africa
- lack of infrastructure
- lack of services
Therefore opportunity to learn from mistakes in developing countries and
establish of computer emergency response team currently there is only one
active CERT in Africa in Tunisia, South Africa is in the process of setting
up a CERT with the deadline of 2010 before the FIFA world cup. While
countries such as Morocco, Kenya and Ivory Coast are thinking about set in
up CERTs.
The approach in dealing with Cybersecurity in developing countries
Success of Cybersecurity is based on 3pillars
1. *Technology pillar* – ICT/security tools –including:
o PCs / networks, physical security tools, data tools (storage media and
cryptography), availability of infrastructure and application (redundant
servers and PKI)
2. *Methodology pillar* – policy, procedures and regulations on three
levels:
o managerial level (security policy, management procedures and capacity
building, audit) Legislative level (law and regulation)
o operational level (acces control rules, implementation plans, monitoring,
watch, incidence handling)
o continuity of services level ( business continuity plan, crisis
management, drill exercises)
- actors in this pillar include the government, security professionals and
users
3. *Social behaviour pillar* – creating a culture of cyber security
o cultivate culture of cyber security through continuous action of raising
awareness using diverse media/channels
o the target audience includes managers, decision makers, security,
children, parents, teachers
*Case study: CERT-TCC - Tunisia*
*The functions of the CERT include*:
- Watch- collect information from different sources eg CISCO, HP. Microsoft,
network of CERTs, community of hackers
- Training
- Coordination
- Response
- Incidence handling
- Incident analysis
- Awareness
- Warning alert
*Key issues*:
• Information, warning and alert – carried out to in collaboration with
ISPs, managers decision makers, internet community through mailing list,
call centre, media
• Oriented campaign – utilizing prospectus, posters, email, radio, cartoons,
video, attack simulation and guides
• Incident handling - training in new tools
• Coordination important in the effective functioning of the CERT – incident
coordination procedures and information including regional CERTs, other
CERTs within the country (for example Brazil has more than one CERT), ISPs
and operators, vendors and integrators, and national authorities.
Need for the formation of CERTs in Africa however the challenges of lack of
"know how" in IT security need to be overcome through:
- capacity building
- encouragement of the development of national solutions based on open
source components
- improved R&D capabilities and making it more responsive to urgent needs
- encouraging academic research in the important topics of security
(cryptography, methodologies…)
*The following questions and comments were raised*:
- the need for social engineering through the creation of a culture of cyber
security to be addressed specifically because of the increased requirements
by government to obligate to provide subscriber identification information
- how can African countries start up a cert- through collaboration for
example with existing CERTs
- in establishing a culture of cybersecurity – consideration should be given
to the fact that there are different social cultures in different countries
however there is consensus on issues such as child pornography, identity
theft
- how can a regional approach be developed where there are differences in
level of ICT infrastructure and use of infrastructure in the delivery of
services, what tools can be used to encourage decision makers to be involved
in the issues of cyber security?
o It was recognised that funding and expertise was required for example
AFDB, World Bank and Islamic Bank while ITU have regional workshops on cyber
security
o As African countries build on infrastructure and services – there is an
opportunity to learn from those that have already developed CERTs.
- How does the CERT monitor traffic: with the collaboration of ISP and
operators as well as supporting legislation
- Regulators need to advice the government to use ICT in development – this
is a manifestation of government commitment
- The role of policy making was emphasized – as it provides government
commitment to using ICT for social economic development and governance and
consequently support for cyber security initiatives – including the
formulation of legislation.
- There should not use a piece meal approach to cyber security to prevent
ineffectiveness for example Mauritius has electronic transaction act but PKI
not yet established
On 12/5/08, mwende njiraini <mwende.njiraini(a)gmail.com> wrote:
>
> Following our recent online discussions on Internet governance issues in
> Kenya, the Kenya IGF and East African IGF; you may wish to follow the
> discussion currently ongoing at the global IGF 2008 in Hyderabad India at
> http://www.intgovforum.org.
>
> Below are highlights from workshops I attended on Day 1 December 3rd):
> *0930-1100 hrs Workshop 43: Legal aspects of governance critical internet
> Policy issues of public relevance*
> *1st presentation*
> The issues on that have legal implications include:
> • internet security intellectual property rights, infringement, privacy and
> protection mechanisms
> • IP domain name protection, conflicts arising out of data and content
> ownership privacy therefore increasing role of P2P in growth of internet 2
> • Consumer status and rights in relation to e-commerce cross border and
> domestic online trade
> • Telecom issue viz backbone deployment and interconnection costs
> • Freedom of expression – the extent of censorship and control on online
> content
>
> There is need for capacity building to create meaningful participation of
> individual and SMEs as well as increasing connectivity through building IXPs
> and local content development
>
> The question was raised as to whether there a need of alternative
> institutional mechanism.
> The salient features of the MOU between ICANN and the department of
> commerce (DoC) include:
> - The affirmation of the role of private sector leadership
> - The role of DoC in ensuring transparency and accountability and effective
> GAC participation
> - Ensure accountability and publish by-laws and strategic and operational
> plans
> - Agreement can be terminated in 120 days
>
> The MOU has been criticized because of the following reasons:
> - US governmental control on root server administration
> - Inconsistent with WSIS principle where no single government should have a
> pre-eminent role
> - Domain name allocation policies need better development
> - IPv4 address allocation have been imbalanced need to ensure IPv6 address
> allocation does not suffer the same effects -This assertion was however
> refuted as IP addresses allocation based on need. The need for prudent
> management and keeping barriers low for the transition to IPv6 was
> emphasised.
>
> To overcome this WGIG proposed 4 models:
> - Global policy council
> - Intenational internet council with leading government role to fulfil the
> ICANN/IANA functions
> - GAC to be strengthened with enhanced coordination function
> - Replace US govt role by general internet council or with world ICANN (in
> lieu of GAC)
>
> The common features of these models were the overwhelming government lead
> and the presupposition of the possibility of international treaties. During
> the discussion the viability of these models was questioned given that speed
> is of essence in the management of internet resources. It normally takes a
> long time to negotiate international agreements; including treaties instead
> a set of principles should be endorsed.
>
> The speaker recommended on the management of critical internet
> infrastructure should take into consideration the following
> • Treatment of technical resources of the internet and global economic,
> social and legal aspects arising out the internet should be at par
> • The development and implementation of polices and standards and solutions
> to various internet issues should be done in a coordinated manner for
> example telecommunication standard development is done in a hierarchical and
> predictable way.
> • New structure would be a supreme authority over internet
>
> In conclusion the speaker asked: Does the internet as we know it need to be
> altered radically? Should the status quo be maintained? Should a Red Cross
> model of recognition by international community states be given to an
> international entity like ITU, INTELSAT. However fundamental change is not
> necessary as failure has not been identified.
>
> *My comment*: this presentation was descriptive and despite the fact that
> an alternative model was proposed the principles, mechanisms that would need
> to be put in place in order to make it work were not discussed
>
> *2nd presentation*
> The next speaker spoke about the ccTLDs in latin Amercia which are broadly
> organised into two main groups: non-governmental and governmental
> organisations. A contribution from the floor however clarified that the
> Brazilian ccTLD is a multi-stakeholder – coordinated by government – but on
> a day by day basis operates as a non-governmental organisation. The Indian
> ccTLD is managed by government and private sector – sovereign interest taken
> care of through government representation.
>
> The rules and regulations under which the institutions that manage the
> ccTLDs are managed determinate legal framework under which they operate.
> Consequently ccTLDs are regulated under national law while ICANN regulates
> gTLDs – The possibility of self regulation is based on the assumption that
> private sector would act in the public interest.
>
> In the discussions some felt that there was need for increased attention of
> government in the management of ccTLDs – as it was critical infrastructure
> while on the other hand other felt that there was the risk of excessive
> regulation with increased involvement of government.
>
> *1130 -1200 hrs Workshop 36: Strategies to prevent and fight child
> pornography in developing countries*
> Child pornography in Brazil has grown out of the popularity of social
> networking. However the main challenge has been issues related to
> jurisdiction as content is resident in ISP based in the USA and
> trans-national ISPs like Yahoo, Microsoft and Google which have branches in
> strategic markets and have tailored the services for these markets in terms
> of language and content.
>
> Brazil was therefore unable to deal with serious offences related to
> content – specifically child pornography - committed by Brazilians using
> Brazilian IP addresses. The government has been able to sign an agreement
> with Google to fight child pornography on Google's orkut social network.
>
> The following are consideration taken in drawing up the agreement
> 1. Which criteria should be used to define the ability of a particular
> country to legislate over and sanction conducts committed on the internet?
> - Where the data is located?
> - International law principles (territoriality or nationality) shall be
> used to define the sovereignty of a state regarding – cyber space – which is
> a network of networks
> - Define some reasonable standard – for example managed by Brazilians and
> is local content and local language
> - Access points in Brazil, harmful conduct felt in the country – taken
> obligation under international law to take offence – country of origin
> approach would force thousands of users to unfamiliar rules and travel –
> offence under human rights therefore apply local legislation
>
> 2. It is legitimate to enforce the conduct of local office –as it
> impracticable to send legal request to the US.
>
>
> New tools have been implement that have reduced number of images uploaded
> and increase in number of reported cases- subject to investigation. It was
> inspiring to listen to parliamentarian talk about the need to have
> legislators engaged in the process as they ultimately pass the laws. I
> appreciated the fact that in there is great cooperation between the
> parliament, government, police, civil society and private sector.
>
> The main challenges are:
> • Lack of awareness and participation by parliamentarians who are critical
> in the formulation of legislation
> • how to obligate ISPs to provide information without infringing on freedom
> of expression and privacy,
> • what criteria should be used to deal with these offences
> • the creation of awareness of ISPs in developing countries of the need for
> judicial cooperation as well as social initiatives to deal with cyber crime.
> • Insufficient infrastructure to deal with this issue – law enforcement
> does not have the human resources and technology
> • Material produced to fight child pornography are not evaluated – they
> should be inline with the demand
>
> *My comment*: I would have like to know if initiatives have reduced
> offences, what is the success rate registered in prosecution, ability of the
> law enforcement and judicial system to deal with offences. There was no
> mention of where initiatives had been launched to fight child pornography on
> the financial front.
>
>
> *1530-1700 Workshop 45: Opening to diversity and competition of the DNS
> system*
>
>
>
> There were 3 presentations in this session:
>
>
> - *1st presentation* - alternate DNS system used in library systems
>
>
> - *2nd presentation* - implementation of security in the Handle system
>
>
> - *3rd presentation –* discussed the Net4D
>
>
>
> Net4D- provides the technical solution to the political concern on the
> control of root servers. Net4D networks enable the following:
>
> • Empower the second generation of the web: the semantic web.
>
> • Multi-stakeholder governance of DNS
>
> • Net4D classes should be open and interoperable
>
> DNS 1.0 – was a monopoly of ICANN web 1.0 html with USA parentage and
> English only while DNS 2.0 is open allowing for competition including inter
> alia:
>
> • Net4D semantic web
>
> • Open coherent approach to linguistic diversity
>
> • Allow technological innovation with value added services
>
>
>
> Concern was however raised on the:
>
> • Investment/implementation cost required to implementation of different
> DNS systems depending on the BIND implemented and root servers enabled
>
> • relinquishing of the political control of root servers
>
> • Value to end users
>
> • Awareness and understanding of the issues by different stakeholders
> necessary – delivered in a way that they can understand
>
>
>
> *My comment*: the session was technical – I hope the techies on the
> mailing list can help us understand the governance issues associated with
> the introduction of DNS competition and the impact on developing countries
> :)!
>
>
>
> Kind regards
>
> mwende
>
1
0
All,
I am forwarding this as requested on the message body.
Please direct any inquiries to the KEBS staffer copied.
Sincerely,
Alex Gakuru
PS:
Walubengo is copied to ensure this larger-than-40k post gets bounced.
AG
---------- Forwarded message ----------
From: Zacheus Mwatha <zimwatha(a)kebs.org>
Date: Thu, Dec 4, 2008 at 10:01 AM
Subject: ADOPTION OF ISO/IEC 26300 AND ISO/IEC 29500
To: Zaheda Bhorat <zaheda(a)google.com>, Zacheus Mwatha
<zimwatha(a)kebs.org>, jsevilla(a)strathmore.edu, JOHNSONM(a)za.ibm.com,
cakunga(a)virtualcity.co.ke, chetan(a)skytechafrica.com,
dofisi(a)cskonline.org, dkamiri(a)kenyalaw.org,
michael.owuor(a)manageworks.co.ke, sammy(a)skytechafrica.com,
mail(a)cskonline.org, bremack1(a)yahoo.com, iondieki(a)vegasoftware.com,
peterk(a)sdae.co.ke, sammynjuguna(a)hotmail.com, edgar.kioga(a)wfp.org,
keziah(a)cskonline.org, jkimilu(a)icsit.jkuat.ac.ke,
samuel.kuria(a)kenya-airways.com, Emmanuel.Birech(a)microsoft.com,
emailsignet(a)mailcan.com, edgar.okioga(a)gmail.com, pmwele(a)gmail.com,
csk(a)nbi.ispkenya.com, vawuor2001(a)yahoo.com, waiganjo(a)uonbi.ac.ke,
Jeremy Allison <jra(a)google.com>, Joseph Mucheru <jmucheru(a)google.com>,
Gakuru <gakuru(a)gmail.com>, Lucy <lucym(a)za.ibm.com>, Okoth Monica
<okothm(a)kebs.org>, Wambua Amos <wambuaa(a)kebs.org>
Cc: mwatha_zacs(a)yahoo.com
Dear Sir/Madam,
There are requests which have been received to adopt the above two
international standards.
Attached are self explanatory letters and adoption proposal forms
which you are kindly requested to complete and return to us for
processing. Kindly note that the form MUST BE SIGNED AND STAMPED
otherwise it won't be taken into account during processing. You are
free to use any mode of transmission (fax/email/post/hand
delivery/etc) as long as the forms reaches us not later than the due
date. Any ballots received after the deadline will be disregarded.
You are free to forward this information to as many stakeholders as
possible since we need a national response to this matter.
Finally, if you forward to any stakeholder or group of stakeholders,
kindly copy me the mail so that i may have a database of all those
that received the information (if you use bcc it won't be of much help
to me).
Kind regards.
Mwatha Z I (Mr.)
Kenya Bureau of Standards
KEBS Centre, Popo Road, off Mombasa Road, Behind Bellevue Cinema
P.O. Box 54974 — 00200 Nairobi, Kenya
ISDN: +254 (0)20 6948270
Tel: +254 (0)20 605490, 6948000, (0)722 202137
Fax:+254 (0)20 609660, 604031
Other E-Mail: mwatha_zacs(a)yahoo.com
__________________________________________________________
"Quality products for quality life"
Disclaimer
This e-mail and its attachments are confidential, private and intended
for the addressee only. Should you not be the addressee and receive
this e-mail by mistake, kindly notify the sender, and delete this
e-mail, immediately and do not disclose or use same in any manner
whatsoever. Views and opinions expressed in this e-mail are those of
the sender unless clearly stated as those of KEBS. The Bureau accepts
no liability whatsoever for any loss or damages whatsoever and
howsoever incurred, or suffered, resulting, or arising, from the use
of this email or its attachments. The Bureau does not warrant the
integrity of this e-mail nor that it is free of errors, viruses,
interception or interference. For information about Kenya Bureau of
Standards visit our website at http://www.kebs.org
--------------------------------------------------
This message has been scanned for viruses and
dangerous content by Jambo MailScanner, and is
believed to be clean.
--------------------------------------------------
"easy access to the world"
2
1
Google Zawadi Africa Scholarship
As part of Google ongoing commitments to supporting education in Africa and
to diversifying the engineering talent pool, they are encouraging African
women to pursue careers in computer science and technology.
Google has partnered with the Zawadi Africa Educational Fund to grant five
Kenyan women full scholarships to complete degrees in computer science,
computer engineering and/or ICT.
The Google Zawadi Scholars will pursue studies at top universities in
Kenyaand South
Africa, and they'll each have the support of a Google engineering mentor.
*Selection criteria include:*
Excellent academics
Extracurricular involvement Leadership potential and financial need. *
Contacts:*
Zawadi Africa Educational Fund
P.O. Box 541046 Cincinnati OH45244
Tel: 513-289-8315 Fax: 513-624-6766
Email: info [at] zawadiafrica. org <http://zawadiafrica.org/>
The scholarship is offered every yaer.
1
0