Date: Tue, 30 Jun 2015 16:31:06 -0700
To: kelvin@skysys.co.ke
CC: isoc@lists.my.co.ke
Subject: Re: [isoc_ke] Fwd: [kictanet] Tough new rules force all Internet users to list their gadgets
From: isoc@lists.my.co.ke
Security is a function of personal freedom.
This binary concept of privacy or security pushes people to compromise on privacy in the myopic idea that security if paramount.
However, unless the people feel safe enough to express themselves, share ideas, organize and basically have that democratic culture, the state understanding of security keeps drifting away from how the citizens understand it.
Cyber crime is, as expected, related to growth in internet connection. Not just in Kenya but globally. Let no one sound the alarm as if Kenya is a special case.
I think the solution lies most importantly in enabling the user defend herself online. 123456 is not a password, no Nigerian will send you USD250,000 just for sharing your name...and a host of behavioral reverse engineering tricks.
That is our first line of defence, while investing seriously in technical capacity locally.
How enforceable are these directives anyway?
On Wed, Jul 1, 2015 at 2:19 AM, Kelvin Githira via isoc
<isoc@lists.my.co.ke> wrote:
Hi All,
I will keep this as simple and as short as i can, just the way i know how to.
The fight against cyber crime is wide and cannot just be won by casting the net on free wifi users. forms of crime vary from sms, phone calls. emails and on chat applications.
To even get close to keeping cyber crime at bay a few things (among others) in my opinion will need to happen in no given order
-cast the net wider to include the use of pen registers and as well as trap and trace devices by the law enforcement authority ( while doing so define what is to be surveyed, is it mass surveillance or only where there is suspicion of crime ?
-Substantiate between devices used to access and platforms used to access i.e a cell phone with mac address x and an email address used by user y ( while doing so define notification to unsuspecting users as well as define the Gag rule to ISP mandated on this process
-define broadly information revealed by "digital dialed" over circuit switched telephony networks as well as information reveled by addressing on packet switched internet networks.
- while tapping into this various forms of communication , law enforcement will need the cooperation of third parties such as the ISP's and telephone companies, to what extend i ask ?
again we are faced with the dilemma, how far should we allow our government to go in there efforts to protect us against crime and terrorism while protecting freedoms and privacy? or is it a case of giving up liberties for more security? Simply put others will argue that the intent is access the internet and sign up freely for surveillance.
regards,
kelvin
_______________________________________________
isoc mailing list
isoc@lists.my.co.ke
http://lists.my.co.ke/cgi-bin/mailman/listinfo/isoc