Kenya's Ingenious Solution To Cybercrime: Register Every Wi-Fi User And Device With The Government
from the criminal-masterminds dept
Good news! Kenya has developed an ingenious, foolproof plan to put an end to the menace of cybercrime as we know it: they'll soon be requiring that all Wi-Fi users register with the government before going online. Since most of us realize that hacking or tricking Wi-Fi authentication systems is impossible, and, as we all know, criminals aren't capable of stealing other peoples' Wi-Fi credentials, Kenya will be at the very forefront of landing a killing blow on internet-based crime as we know it for decades to come. It's simply amazing that someone didn't come up with this idea sooner.The new head of Kenya's Communications Authority, Francis Wangusi, last week stated in a speech that Kenya has taken over chairmanship of Association of Regulators of Information and Communications for Eastern and Southern Africa (ARICEA), a body that fights cybercrime within member nations. A new mandate of the group will require that every single Wi-Fi device in each and every member nation be registered with KENIC for the good of internet users everywhere:
"He added that Kenyans will also be required to register their mobile devices with Kenya Network Information Centre (KENIC) in new rules aimed at fighting cyber- crime. "We will license KENIC to register device owners using their national identity cards and telephone numbers, the identity of a device will be known when it connects to Wi-fi," said Mr Wangusi at the ARICEA annual general meeting Tuesday in Nairobi. CA is also committed to conduct a detailed study on the depth of web hackings in the country. Wangusi said cyber-attacks are on the rise with the banking sector suffering most, followed by government officials."Other reports seem to indicate the well-formed plan could just involve users having to plug in a passport or other ID number before being able to access the internet whatsoever:
"We are considering the idea of ensuring the Public Wi-Fi is not accessed without a log in. The logging in of the public domain will require one’s passport number, ID Number or telephone number," he said. "The unique number of a device is identified on the internet but we can’t identify who is owning it, if you don’t use the right identification numbers. That’s why we insist on logging in the Public Wi-Fi with personal credentials. This will help us in securing the cyber space, in case of cybercrimes,” he said."Since MAC spoofing apparently doesn't exist in the alternate dimension I'm currently writing this story from, it should be relatively easy to get everybody voluntarily registered while constantly monitoring and thwarting any attempt to bypass the system. Similarly, since fighting the ambiguous menace known as "cybercrime" is never used as a pretense to expand government surveillance and brick-and-mortar oppression, Kenya will likely spearhead this bold new assault on internet skulduggery without any negative repercussions whatsoever for the public at large. Amazing!
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: cybersecurity, kenya, registration, wifi
Reader Comments
Subscribe: RSS
View by: Time | Thread
Yes, I'm 3/26 now.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
SMAC MAC Address Changer
[ link to this | view in chronology ]
Re: SMAC MAC Address Changer
(Similar to MAC whitelisting/blacklisting, except those use entire addresses.)
[ link to this | view in chronology ]
Re: Re: SMAC MAC Address Changer
[ link to this | view in chronology ]
Where will the cyber criminals go?
Wait, is this an old article? Did this already happen? I'm confused.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Control! CONTROL! YOU MUST LEARN CONTROL!
[ link to this | view in chronology ]
And the really funny thing is ...
Definitely sounds like politicians making laws about technology when they don't have the foggiest concept about the technology.
[ link to this | view in chronology ]
Re: And the really funny thing is ...
[ link to this | view in chronology ]
Re: Re: And the really funny thing is ...
"Dear honorable sir, I am Jobley Masterson, esq and I represent a Nigerian price..."
[ link to this | view in chronology ]
Re: Re: Re: And the really funny thing is ...
[ link to this | view in chronology ]
Well, not /all/ of them...
Can't track the ones that write the rules, or the ones who buy them after all. /s
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Australia. Again.
[ link to this | view in chronology ]
WiFi only?
[ link to this | view in chronology ]
[ link to this | view in chronology ]