<div class="single_line" style="border-bottom-width:1px;border-bottom-style:solid;border-bottom-color:rgb(201,201,201);color:rgb(52,52,52);font-family:'Lucida Grande',Verdana,Arial,Helvetica,sans-serif;font-size:11.199999809265137px;text-align:left">
<div class="box_wrapper1" style="margin:6px"><div class="box_no_border" id="box1107" style="background-color:rgb(255,255,255)"><div class="content_title"><h2 style="font-family:Arial,Helvetica,sans-serif;font-size:1.7em;color:rgb(0,0,0);padding:0px;margin:0px">
<br></h2><div>Hello, I thought yo might be interested in the article below - apologies if not useful.</div><div><br></div><div>Yassin</div><h2 style="font-family:Arial,Helvetica,sans-serif;font-size:1.7em;color:rgb(0,0,0);padding:0px;margin:0px">
East Africa moves to control cyber crimes</h2></div></div></div><div class="box_wrapper1" style="margin:6px"><div class="box_no_border" id="box1108" style="background-color:rgb(255,255,255)"><div class="byline" style="font-size:13px;color:rgb(0,140,254);text-transform:uppercase">
BY JAMES GASHUMBA</div></div></div></div><div class="single_no_line" style="color:rgb(52,52,52);font-family:'Lucida Grande',Verdana,Arial,Helvetica,sans-serif;font-size:11.199999809265137px;text-align:left"><div class="box_wrapper1" style="margin:6px">
<div class="box_stack_left" id="box1110" style="float:left;padding-right:4px"><div class="publish_date" style="font-weight:bold;color:rgb(0,0,0)">29th July 2012</div></div></div><div class="box_wrapper1" style="margin:6px">
<div class="box_stack_right" id="box1111" style="float:right;padding-left:4px"><div class="email_page" style><div class="tool_img" style="float:left;padding-left:2px"><img src="http://www.ippmedia.com/images/frontend/email.png" border="0"></div>
<div class="tool_txt" style="float:left;padding-left:2px">Email</div></div></div></div><div class="box_wrapper1" style="margin:6px"><div class="box_stack_right" id="box1112" style="float:right;padding-left:4px"><div id="print_article" style="padding-bottom:4px">
<div class="tool_img" style="float:left;padding-left:2px"><img src="http://www.ippmedia.com/images/frontend/printer.png"></div><div class="tool_txt" style="float:left;padding-left:2px">Print</div></div></div></div><div class="box_wrapper1" style="margin:6px">
<div class="box_stack_right" id="box1113" style="float:right;padding-left:4px"><div id="comments_top" style><div class="tool_img" style="float:left;padding-left:2px"><img src="http://www.ippmedia.com/images/frontend/comment_bubble.png"></div>
<div class="tool_txt" style="float:left;padding-left:2px">Comments</div></div></div></div><div class="clear" style="clear:both"></div></div><div class="single_no_line" style="color:rgb(52,52,52);font-family:'Lucida Grande',Verdana,Arial,Helvetica,sans-serif;font-size:11.199999809265137px;text-align:left">
<div class="box_wrapper1" style="margin:6px"><div class="box_no_border" id="box1115" style="background-color:rgb(255,255,255)"><div class="content_highlights"></div></div></div><div class="box_wrapper1" style="margin:6px">
<div class="box_no_border" id="box1116" style="background-color:rgb(255,255,255)"><div class="article_content"><div class="read_image_box" style="margin-left:10px;margin-bottom:5px;width:280px;float:right"></div><p style="margin-bottom:0px">
East Africa is fast-tracking the implementation of joint initiatives to combat the rising challenge of cross-border cyber crimes that threaten peace and stability in the region.</p><p style="margin-bottom:0in">Government officials say the region is vulnerable to a range of online criminal activities, including financial fraud, drug and human trafficking, and terrorism.</p>
<p style="margin-bottom:0in">"There is need to develop a common platform to address cyber security. As a region, we must begin to cooperate to deal with cyber threats at national and regional level," Kenya's Permanent Secretary in the Information Ministry Dr Bitange Ndemo said at an East African Internet Governance Forum in Nairobi, Kenya .</p>
<p style="margin-bottom:0in">The East African nation has scaled up efforts to combat cyber crimes through a multi-stakeholder approach involving the government, industry and civil society organizations.</p><p style="margin-bottom:0in">
"Kenya has a national cyber security steering committee hosted by the Communications Commission of Kenya (CCK). The law enforcement agencies and industry players are included in this initiative," Ndemo said.</p>
<p style="margin-bottom:0in">He regretted cyber crimes have significantly reversed gains made by higher internet penetration in Kenya. The country has taken a lead role in galvanising regional efforts to fight cyber crimes.</p>
<p style="margin-bottom:0in">According to Ndemo, a cyber security management task force chaired by Kenya has been coordinating activities aimed at curbing cyber crimes in the five East African Community member states.</p>
<p style="margin-bottom:0in">The taskforce deals with cyber security at legal, policy and regulatory level. Cyber attacks are a recurrent phenomenon in the East Africa due to infrastructural, legal and policy loopholes, he explained.</p>
<p style="margin-bottom:0in">Chris Mulola, the president of the Internet Society of Rwanda made reference to a study done by an international auditing firm, Deloitte and Touche, which revealed that 60 per cent of East African banks were susceptible to cyber crimes. The estimated cost of combined threats of cyber crimes to financial institutions in the region was estimated at 245 million US dollars.</p>
<p style="margin-bottom:0in">He called for the establishment of entities to monitor and report cyber crimes across borders. "Lawmakers must also be involved to help pass legislation that addresses cyber threats at all levels," Mulola said.</p>
<p style="margin-bottom:0in">Capacity building, cooperation with law enforcement agencies and linkages with internet service providers, telecommunication operators and software suppliers have bolstered efforts to curb cyber threats, according to experts.</p>
<p style="margin-bottom:0in">Kenya has taken the lead by establishing national computer emergency response teams endorsed by all East African Countries. The focus is on research to improve security of existing systems while monitoring cyber security events globally.</p>
</div></div></div><div class="box_wrapper1" style="margin:6px"><div class="box_no_border" id="box1117" style="background-color:rgb(255,255,255)"><div class="publication_name" style="font-size:15px;color:rgb(0,140,254);text-transform:uppercase">
SOURCE: GUARDIAN ON SUNDAY</div></div></div></div><div><br></div>-- <br><div><font color="#3333ff"><i><b>Independent Consultant</b></i></font></div><div>c/o DFID-Sierra Leone</div>5 Off Spur Road, Wilberforce<br>Freetown,SIERRA LEONE<br>
Skype: yassinmshana1, Mobile:+23276926697, Fax: (+232) 22235769<br><div><b style="background-color:rgb(255,255,255)"><font color="#33cc00">Do You really NEED TO PRINT THIS?</font></b></div><div><span> </span><i> <font color="#330099">"The illiterates of the 21st century are not those who cannot read or</font></i><div>
<font color="#330099"><i> write</i><i> but those who cannot learn, relearn and unlearn" Alvin Toffler</i></font></div></div><br>