">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Sunday, January 17, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

Communications Authority of Kenya Says Not Planning to Spy On Mobile Phone Users

Milcah Lukhanyu by Milcah Lukhanyu
4 years ago
in Tech, Telcos
8 min read
0

The Communications Authority of Kenya denies plans to use the yet to be installed Device Management System to spy on its users after various media platforms reported so.

The CA denies that the Device Management System (DMS) is not for monitoring and accessing private data of mobile phone users and the government has not asked it to install it.

According to CA, the DMS amis to curb SIM-boxing, which is used by unscrupulous people to illegally divert and terminate telecommunications traffic, not only poses a security threat but also leads to loss of revenue to both mobile operators and government through evasion of taxes.

The Authority added that implementation of this system is also intended to meet the requirements of the East African Region under the Northern Corridor Integration Project Heads of State Summit, which directed each member state to deploy systems that curb illegal by-pass and termination of telecommunications traffic within the context of the ‘One Network Area’.

“It is against this background that the Authority has continued to revamp the framework for the management of illegal telecom devices in the country,” said Francis Wangusi, the Director General at CA. “Indeed the acquisition of a Device Management System (DMS) is the second phase of the initial initiative that saw Mobile Network Operators switch off all counterfeit mobile devices in Kenya in 2010.”

Wangusi in a statement added that the Authority, following extensive consultation with industry and other stakeholders including COFEK, facilitated the set up of an SMS-based mobile device verification service, through use of the “1555” short code for use by consumers in confirming the status of mobile devices before purchase. The set up of the device verification system was undertaken with the understanding that there would be a second phase that would involve deployment of a more comprehensive system that would address importation of illegal devices, pre-shipment verification of devices as well as denial of service of devices already in the market.

READ  GoMetro launches GoMetro Pro, a transport mapping and data collection platform

The DMS is the second phase of the system in order to manage the menace of counterfeit devices.  CA added that the system is being deployed in close consultation with the local mobile network operators. Contrary to the claims raised through COFEK, the implementation of the system is being coordinated by a team that has the involvement of the mobile network operators, CA and other relevant government agencies.

Related posts

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0

How to fuliza by Safaricom guide

January 15, 2021
0

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0
signal-apps

Is Signal That Different From WhatsApp? Here Are 5 Ways It May Be Different

January 15, 2021
0

“The DMS is a comprehensive system that is not only able to manage entry of devices into the country but equally prevent access of illegal communication devices to mobile telecommunications services. The DMS will be populated by data of all genuine devices (a whitelist), to uniquely identify each device,” he said. “Once deployed, the DMS shall facilitate denial of service to all illegal communications devices within the country including SIM boxes, counterfeit, substandard, non-type approved and stolen devices.”

The DMS has capability to isolate and deny services to the illegal devices as they have the potential of being used by those with criminal intent to compromise security.

It is important to note here that the system is deployed in a manner that facilitates mobile network operators to make reference to the database of all genuine devices (a whitelist) to solely verify the status of the phone device before providing service to the user.  This is contrary to reports that the system will be extracting subscriber data for use by third parties.

READ  PayU Set To Target Nigeria's N200 billion Online Payment Market

All mobile operators will be required to connect to the DMS and ensure that blacklisted devices do not access mobile services.  This process was initiated with the understanding of the operators through a consultative process from the conceptualization stage.

CA also added that the system does not access subscriber personal information details, and therefore cannot access personal data as claimed in a section of the social and local media. It added, it has been consulting and has engaged industry stakeholders and relevant Government Agencies in an effort to manage the proliferation of illegal mobile communications devices.

The Agencies consulted include the Anti-Counterfeit Agency (ACA), Kenya Revenue Authority (KRA), National Police Service (NPS) and Kenya Bureau of Standards (KEBS) and all mobile operators.

Prior to deploying the system, the Authority is planning to roll out consumer awareness to increase the understanding of the scope and impact of this system to users of illegal communication devices.

According to Wangusi, the proliferation of counterfeit devices, often illegally imported and acquired by the public, presents a serious challenge to mobile networks and subscribers. Besides compromising the optimization of mobile networks, such illegal devices degrade the quality of service available to users.  The use of counterfeit devices poses a great security threat, because such devices do not provide for effective identification or traceability of network transactions/users. The DMS aims to end that.

 

Readers 4,656

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Tags: SecuritySTARTUPTech
Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

cryptocurrencies

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0
How To

How to fuliza by Safaricom guide

January 15, 2021
0
Tech

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0
signal-apps
Tech

Is Signal That Different From WhatsApp? Here Are 5 Ways It May Be Different

January 15, 2021
0
Tech

Between WhatsApp, Facebook And Signal Which Platform Collects More Personal Data?

January 15, 2021
0
Tech

HTML5 Tech Takes Over from Flash to Advance E-Sports Industry

January 15, 2021
0
uganda-8
Tech

This Is Why The Ugandan Web Is Currently In Turmoil And Their Internet Has Been Shutdown

January 14, 2021
0
Leadership

SEACOM suffers second major executive exit as CTO resigns

January 14, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

realme to release more phones in 2021 to grow its smartphone market share

January 16, 2021

What You Need To Know To Manage Your Network Effectively

January 16, 2021

Baidu establishes an Intelligent electric vehicle arm to bring autonomous cars on a road near you

January 15, 2021

Adam Molai’s JUA Kickstarter Fund Doubles to $2M to Kickstart African Entrepreneurship

January 15, 2021

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: