Hello,

Below 2007 conversation forward may be of interest.

regards,

Alex

---------- Forwarded message ----------
From: JFC Morfin <jefsey@jefsey.com>
Date: Fri, Aug 3, 2007 at 10:10 PM
Subject: Re: [isoc-members-discuss] Foreign Intelligence Surveillance Act amendments
To: Adam Peake <ajp@glocom.ac.jp>, Jonathan Robin <jonathanrobin@yahoo.com>, isoc-members-discuss@elists.isoc.org


Dear Adam,
in intelligence gathering the actual content of transactions is of
low interest - it may call for important efforts to be understood at
very low results. What is far more important is who has
contacted/connected who. Also patterns and patterns changes in
traffics. Mail can give micro information on people and information
on who contacts who, who is contacted by who, etc. The root archives
contains a lot of very precise informations (you can change a mail
name, less likely a site name) with a stable flow and stables
references (the noise which probably peaks at least at 97.5%).

This is the reason why the USA make the world believe the root server
system is important. The cost of running a root server is high. What
are the motivations of those doing it? Specially the US Gov ones?
Strange that no tax-payer ever asked. Disclosing about the mail is
not disclosing. Disclosing about root is still considered as far more
confidential and far more important. However, detailed reports on
root related intelligence leaks is one of the first trigger which
helped politics to understand the importance of the on-going digital
warfare. Long before Rumsfeld's road map derestricted publication.

Questions:
- who pays the USG root servers budget?
- why has no Congressman investigated that public expense?
- what would really happen to the Internet should the root server
system stopped for ever at this very instant?
- what would happen to the Internet and to the world would the root
file be supported no more by ICANN?
- IAB has published RFC 3869 to call the attention of the USG on the
need to fund Intenet R&D. Why multilingualisation is not mentionned,
which calls for a presentation layer (the reason why IDNs are a
poblem), but would permit to run the Internet under scores of different roots?
- EITF/IAB have released a summary of the ROAP (Routing and
Addressing Problem) listing the priorities for a new routing and
addressing solution. Why "routing path decided by the individual
sender" is not even listed?

I am afraid that the solution at hand is for ISPs to propose a
non-US-through value added routing service, resolving on non-US root
servers. I proposed this to be studied as a regalia service. We
tested (as part of the dot-root project). And started the AFRAC
project which is at the rot of the multilingual distributed
referential system, to replace the unilateral IANA and Yankee Google,
by a multilateral virtual infrastructure.

Terrorism is a good alibi to spy on privacy, policy, e-commerce,
economy, industry.
jfc


At 20:10 03/08/2007, Adam Peake wrote:
>At 6:56 AM -0700 8/3/07, Jonathan Robin wrote:
> >today's article in the Washington Post
> >http://www.washingtonpost.com/wp-dyn/content/article/2007/08/02/AR2
> 007080202619.html?hpid=topnews
> >   explicitly confirms for the first time the
> >information gathering aspects of the U.S.
> >Government agencies in respect of root servers
> >
>
>
>Robin, I don't understand your reference to root
>servers.  The article mentions email passing
>through "communications nodes", wouldn't these be
>just telco owned facilities (perhaps the answer
>is don't peer with AT&T :-)
>My limited technical knowledge, but I was under
>the impression the root server system wasn't a
>lot of use for interception email traffic...
>Happy to learn more.
>
>Adam
>
>
> >   should ISOC members seek a consensus response
> >to individual governmental overview in respect
> >of both privacy implications and also taking
> >into consideration the possibility of ways
> >individual nations' network surveillance - China
> >no comment inter alia - could compromise the
> >integrity of what remains of yesterday's
> >Internet ?
> >
> >
> >
> >Best Regards
> >
> >Jonathan Robin
> >
> >
> >Life : A finite succession of infinite opportunities
> >
> >Internet Governance Profile http://www.icdri.org/JR.htm
> >
> >
> >UNESCO UNITAR Scientific Committee
> >Advisory Board
> >International Center for Disability Resources on the Internet
> >
> >---------------------------------
> >Got a little couch potato?
> >Check out fun summer activities for kids.
> >_______________________________________________
> >ISOC-members-discuss mailing list
> >ISOC-members-discuss@elists.isoc.org
> >http://elists.isoc.org/mailman/listinfo/isoc-members-discuss
>
>
>_______________________________________________
>ISOC-members-discuss mailing list
>ISOC-members-discuss@elists.isoc.org
>http://elists.isoc.org/mailman/listinfo/isoc-members-discuss


_______________________________________________
ISOC-members-discuss mailing list
ISOC-members-discuss@elists.isoc.org
http://elists.isoc.org/mailman/listinfo/isoc-members-discuss





On Tue, Sep 3, 2013 at 9:58 AM, Alex Gakuru <gakuru@gmail.com> wrote:

On Mon, Sep 2, 2013 at 12:41 PM, Davis Onsakia <mautidavis@yahoo.com> wrote:

Issues about privacy online (and offline) and who really 'owns' your data will be dealt with better when the Data Protection and Freedom of Information bills are enacted into law.As for now, we are really exposed bearing in mind that you cannot do much without the law being on your side!

Traditional escapism and diversionary logic – when cannot deal with giant monster realities out there, just slap own-self in the face and you'll forget about it.

 
To keep your data safe: dont browse the Net, own and use a mobile phone.... basically not possible, we need protection and enforcement!

Because there are so many road accidents, suggest we should also avoid crossing the roads, boarding or vehicles? Only walk and avoid shelter from trees – but lighting could strike and cause harm. Should remain indoors...but wait a minute, an earthquake could split the ground open and the the house sinks. Life is so dangerous no-one should be living?


 
From: Kelvin Githira <kelvin@skysys.co.ke>
To: Alex Gakuru <gakuru@gmail.com>
Cc: "isoc@lists.my.co.ke" <isoc@lists.my.co.ke>
Sent: Friday, August 30, 2013 10:26 PM
Subject: Re: [ISOC_KE] Fwd: [i-network] Fwd: {UAH} Facebook: Uganda requests for user account information - National - monitor.co.ug

Let be very honest with our selfs. There is no data privacy. 

We are often than note made to believe that our data is secure when we sign contracts after reading and agreeing to terms, what we forget most iften the terms dictate that the (data handler) will not knowingly divert data to un authorised individuals , but i ask do we agree that there are authorised individuals in an organisation who live amoung us that have access to our data and they have a lee way to it ? 

Ask me you want your data to be private ? Dont upload it. 

Same case with a secret we take them with us. 


Sent from my iPhone

On Aug 30, 2013, at 1:12 PM, Alex Gakuru <gakuru@gmail.com> wrote:

How about this?
Regards,
[Sent from my tiny screen wireless device. Excuse mobile brevity and or unintended typos]
On Aug 30, 2013 11:32 AM, "Barrack Otieno" <otieno.barrack@gmail.com> wrote:
Interesting read, we discussed similar issues at the Kenya IGF.

Best Regards

---------- Forwarded message ----------
From: Dumba Nicholas <nicholas.dkatumba@gmail.com>
Date: Fri, Aug 30, 2013 at 10:50 AM
Subject: [i-network] Fwd: {UAH} Facebook: Uganda requests for user account information - National - monitor.co.ug
To: I-Network Uganda <i-network@dgroups.org>


Just in case you might be interested.





Facebook: Uganda requests for user account information - National

Facebook has revealed that the government of Uganda is among the 74 countries that requested for user account information of some of its citizens on social media platform in the first six months of 2013.
 The requests are made under the dockets of national security and criminal investigations by governments.
 In its first release of the Global Government Requests Report, Facebook’s general Counsel, Mr Colin Stretch noted that the release of the report is aimed at helping the on-going global debate about proper standards for governments around the world to access user information.
The list put out by Facebook shows Uganda was among the five African governments that requested for user information to conduct official investigations.
However, Facebook declined to disclose the data of the users that government had requested for.
Five African countries made the list with South Africa leading at 14 requests. Egypt has 8, Ivory Coast 4, Botswana 3, while Uganda had one request.
 Facebook has a stringent legal process for governments to access user data which involves detailed information of a legal basis and factual evidence for each request.
 The report comes just months after Security Minister Muruli Mukasa revealed that government was in the final stages of setting up a social media monitoring unit to follow social media discussions and weed out people damaging the reputation of government and its officials.
But Mr Ofwono Opondo, the director of the government Media Centre, the information was requested to facilitate the Uganda Police investigate cybercrime.
“The intersection warrant in the Communications Act 2010, gives Police through government, powers to apply for information from any organisation including international communication agencies such as Facebook to aid it in investigating crimes such as money laundering and threats,” Mr Opondo said.
Other countries mentioned by the release were United States that topped the list of countries requesting for over 12,000 Facebook user accounts information.



--
Regards,
____________________________________________________________________________
Nicholas Ddumba Katumba
P.O. Box 22249, Kampala - Uganda; Tel: +256 712 212109, +256 756 212109, +256 776 210975
Facebook: Nicholas Ddumba Katumba; Skype: nick-d-k; LinkedIn: Nicholas Ddumba Katumba
Blog: http://ddumba.wordpress.com; Twitter: NDKatumba
; Google+: Nicolas Dumba Katumba







Read the mailing list rules - http://www.i-network.or.ug/index.php?option=com_content&view=article&id=189&Itemid=193
Visit the I-Network website - www.i-network.or.ug
Follow I-Network on Twitter: http://twitter.com/inetwork
The I-Network Dgroup is a platform for ICT Knowledge Sharing


---------------------------------------------------------------------------------
Visit [web site]( http://dgroups.org/iicd/i-network/ )
Click [here]( mailto:leave.i-network@dgroups.org ) to unsubscribe
The email is intended only for the recipients. The owners of the Dgroups cannot be held responsible for the contents of the email message.



You are receiving this message because you are a member of the community I-Network Uganda.
A reply to this message will be sent to all members of I-Network Uganda.



--
Barrack O. Otieno
+254721325277
+254-20-2498789
Skype: barrack.otieno

_______________________________________________
isoc mailing list
isoc@lists.my.co.ke
http://lists.my.co.ke/cgi-bin/mailman/listinfo/isoc

_______________________________________________
isoc mailing list
isoc@lists.my.co.ke
http://lists.my.co.ke/cgi-bin/mailman/listinfo/isoc

_______________________________________________
isoc mailing list
isoc@lists.my.co.ke
http://lists.my.co.ke/cgi-bin/mailman/listinfo/isoc