Wednesday, February 13, 2019

Ed alcantara,the chief of cyber intelligence had this to write on E2EE

End-to-end Encrypted (E2EE) Messaging has become the latest craze, but what does it really offer? The principle behind E2EE is that no one, not even the messaging app provider, should have access to the messages between two individuals. This has created an explosion of E2EE messaging apps which has not gone unnoticed by criminal networks. In fact, criminals seem to be progressing from darknet forums to apps such as Telegram at an alarming rate.
Extremist propaganda, cryptocurrency scams, human trafficking, child exploit, illegal narcotics, cyber-crime, animal poaching, arms trafficking, counterfeit documents, counterfeit merchandise and more… In just under 24 months, we have observed the trend of illicit offerings migrating from darknet black market places (hosted on Tor, I2P, Freenet) to encrypted messaging apps. This is incredibly important since criminals were formerly restricted to the limited anonymity and obfuscated features of the darknet, and it is more secure to hide criminal activity inside an E2EE system.
The Telegram messaging app was built with 256-bit encryption encoding and can handle larger chats and channels of up to 50,000 users. To show how much traffic is going through just this one app, according to Wikipedia, in March 2018, Telegram stated that it had 200 million monthly active users. Additionally, according to Telegrams’ CEO Pavel Durov, a year ago Telegram was growing at a rate of over 50% annually. Conversely, TOR started out this year with over 4 million daily users and as of the end of March was running closer to 2 million daily users (see chart from metrics.torproject.org below).

Directly connecting users
Of late, Telegram has come under such scrutiny, that iTunes had banned the app due to it being a safe haven for pedophiles and terrorist organizations. Telegram has since allegedly re-mediated the reasons for being banned and is once again available in the iTunes store for download.
However, Telegram isn’t just a breed ground for illicit activities; it has also been used as a voice for protest groups in countries under state oppression. The most recent example of this is Iran, where during anti-government protests, the app was banned. There are other countries who have banned the app for various reasons, but the most prevalent seems to be to prevent the large amount of nefarious activity.
Is everything that runs through a system claiming to be E2EE encrypted? Not necessarily… Each company decides:  how secure they want to be, which messages are E2EE, or even allowing the users to toggle their own level of encryption.
During the last 7 days we have observed 12,907 links shared in criminal and terrorist group channels on Telegram.
Check back
After March 7, 2019, notifications for Google web products will no longer be accessible from the navigation bar. If you'd like to receive similar notifications in the future, you can update the notification settings for your individual Google products.

We are under threat on our social media like facebook,instagram and gmail!!!!


To mr mark zuckerberg and his group,i pretty well know that ain't supposed to send this to your inbox but please make sure that you do some updates in the facebook database and am abit scared for all ugandans using facebook may unknowingly be under spys......This contains parts of the message i sent to mark zuckerberg on facebook and email i sent to hackerone!
Facebook vulnerabilities
I have heard that you are about to have a new development in the incorporation of both instagram,messenger and whatsapp in a sort of intergrated messaging procedure but before you do this i wanna alert you on and of some holes in your social media platforms..these holes may be carried on and it may end up affecting all the applications.
One is the authentication and verification of a phone number associated with a given account on some of the social media accounts e.g especially those created using an email account only as . . a login id ,these accounts are usually compelled to add a phone number which must be verified but on such accounts one can temporary use a phone number without verification for a couple of weeks or more month because on the three facebook accounts iam testing iam and gave been able to use one phone number to login to three different facebook profile accounts;where one is originally verified and associated with a different account while the two others are temporarily using it,a phone number verified to be a login id of another different facebook account can be added and used as a phone number on another account meaning that one phone number can be used to log in to more than two different accounts.On 11/2/2019 i finally came to prove that even one same phone number can be verified and confirmed on more than two differrent facebook accounts.i will explain later about how it is done on my next research am doing on gmail accounts.its annoying that when i sent this email to hackerone,the issue of phone numbers sending reset codes was electified by facebook and i do not understand why they have kept a deaf ear on this issue of one number getting associated with more than two accounts.in my research i also discovered that someone can use ones phone as a login number to a given facebook account without the consent of the owner of that phone number!!!!I think this sounds crazy but its reality..this is possible on some browsers and Facebook pplication on some chinese made phones especially those running on spreadtrum micro chips,the most common browser which is a culprit to this is the NOKIAJAVA ME running on small Techno and airtel phones......plus most techno and airtel smartphones with other browsers are also prone to this however it should be noted that the opera mini browser doesnt allow a such for when i tested it on all the chinese phonebe it techno ,airtel and others it always showed that a phone number is associated with a facebook thus i concluded that on opera mini its had to add a phone associated with another account to act as a login number to another different account,i again noted that;an email associated with another facebook account cannot be used as a second login number to another account unlike phone numbers.now what worries is and what am asking myself is why has facebook managed to make sure that an email that is verified with another account cqnnot be used on another account,why can't they do it on phone numbers.Again,why does a phone number has to be kept pending for more than a year?one can add such a number and he/she doesn't verify it yet it still can be used as a login id for that account,this means that there is a problem with facebook's database.however i have come to prove that this phenomenon is mainly common on browser that are inbuilt on chinese phones or on facebook applications inbuilt on chinese made phones...!!!!thus am compelling the facebook development team to revise their database and make sure that one single phone number must be used " only and only" on one facebook account.
Which official phone numbers from facebook are allowed to send password reset messages to us?
I think many may be not aware that some phone numbers which aren't official facebook's number do send reset codes to our phone numbers associated qith our facebook accounts.they end up even sending facebook links for reseting our passwords which are phish.in some countries where telecommunication companies aren't indipendent, i think government security bodies can force them to surrender facebook users' numbers and some times can divert messages to their numbers so as to interfere with their works on facebook.i have also a belief that these governments have used the ss7 exploit to divert messages to phone numbers of facebook accounts that they think is a threat to them.i have had many scenarios where certain phone numbers from some african country owned by security agencies have been sending password reset messages and reset links whenever one tries to reset his or her account password!! Its really shocking how local number can send one a message if he or she tries to reset his or her password.this messaging from localphone numbers also does occur on Instagram.why does facebook send a message via another number not their own official number?are there local phone numbers that are suppossed to send such messages?if facebook is aware of this or not,then facebook must know that it is very dangerous to someones security and privacy more especially here in africa where governments try all means to interfere into people's privacy...what Facebook and instagram must do is to make sure that phone numbers registered with profile accounts are the ones which must recieve reset messages and such messages from their web database must not pass via any diverted number.i think facebook has much changes to do and implement on its database.
The biggest and graveous threat here is that"as we all know that a reset code sent has some designed time until when it becomes invalid if its not used" but what i have discovered is that such phone numbers that pretentiously send these codes on behalf of facebook even resend a reset code that was earlier sent even after 12hours or more and this reset code can be used to change a password of the facebook account!!! I know its hard to believe this but what am sure of is that such numbers especially here in Uganda have deliberately been established by some authorities(and like in USA where telecom operators  and employees were known to be conniving with fraudulent thugs in simcard swapping to steal peoples cash,i can again not exonerate employees of these Ugandan telecom companies.its real absurd that such numbered maybe not registered in names of the real people behind these crimes) to crack down people whom they think aren't good to them or are against their government and i cannot rule out some foreigners carrying out some espionage against uganda.this puts some many of us at a risk and  am sure that for almost 18 months Ugandans using mobile phone simcards to access facebook,instagram,t­witter,whatsapp were in some way being monitored and am again sure that all Ugandans using ugandan phone numbers to access social media are under this threat!!!i know some of you will look at this as a simple matter but imagine someone having the ability to intercept the actvities on your phone and simcard,i mean messaging, calling,video chatting ......etc! This pretentious sending of security reset codes can affect all apps that do not have end to en encryption.... And am sure that facebook,instagram,twitter are under thus threat.
Some of the examples of these numbers that send these reset codes are +256771952364,+25677­3120478,+25677242364­5............and many others


as you can see the phone number 0778364517 is conformed on an account i had created... But i later deleted it!! But that number was already confirmed on another account


Why intergrate facebook,instagram and whatsapp?


If you haven’t heard, Facebook announced that it’s working to integrate three major chat platforms — Messenger, Instagram and WhatsApp — in order to allow cross-communication for users.
This is a huge development.
Facebook acquired Instagram in 2012 and WhatsApp in 2014, making this power move possible.
The new infrastructure would keep the three applications distinct while simultaneously allowing users to chat with each other, regardless of their platform.
The project is under development and has at least another year until the infrastructures are integrated.
Today, here are eight things you should know about the Facebook Messenger, Instagram and WhatsApp Integration
 and what it means for users, marketers and businesses.

1. Users gain a windfall of convenience through the integration

When looking at all of the people who use these apps, Facebook realized that the process could be streamlined, making life more user-friendly.
After announcing the new messenger concept, the company told The New York Timesthat they are striving to “build the best messaging experiences we can; and people want messaging to be fast, simple, reliable and private.”
“We’re working on making more of our messaging products end-to-end encrypted and considering ways to make it easier to reach friends and family across networks,” said Facebook.

2. The integration’s a massive opportunity for businesses to reach a bigger and more diverse audience

Along with the three chat applications’ collective 2.6 billion users, there is another group that will reap the benefits from this app integration: businesses.
Think how much more effective it will be for businesses to reach out to customers on three diverse chat applications from one chat marketing platform.
With this new update, you will be able to reach a larger, worldwide demographic and spend more time connecting with both new and returning customers.
Soon, not only will you connect with the 16-24 year old demographic that dominate both Instagram and WhatsApp, but you’ll be able to reach the increasing number of 25 and older users that thrive on Facebook as well.
And there is no more need to worry about how to connect global markets, with WhatsApp’s largest user bases falling in Asia, South America and Europe.

3. Facebook expects major revenue from the integration

The integration opens up substantially more revenue through new business services like new space for advertising inventory for Facebook.
This is something the company needs, as they’ve voiced concern over saturated ad space in recent years.
Let’s not forget that ad revenue is critical to the company’s survival as well — in a previous quarter, they pulled in $6.2 billion in ad revenue alone.
Sources also hinted at the possibility of exclusive features that users can pay for.
By creating more space for innovation, Facebook brings in bigger profits and more business.

4. Chatbots are about to explode in marketing

Chat marketing is the biggest opportunity for marketers of the next few years.
Chat marketing automation checks off a number of the most user-centric, growth-critical trends in digital marketing, namely: artificial intelligence, automation, personalization and interactivity.
Recommended for You
A conversational interface coupled with artificial intelligence crushes a business’s conversion obstacles and enables instant customer service.
Already love using chatbots to reach your customers on Facebook Messenger?
Get ready to turn on those same chatbot marketing funnels through WhatsApp and Instagram with little additional effort.
With this integration, businesses will be able to easily connect with customers around the world, across diverse populations, using a single chatbot building platform.

5. Businesses gain an effective alternative to email marketing’s declining engagement

This integration gives businesses a global channel for direct communication that’s more engaging and user-friendly than email marketing.
Benchmark reports show the average open rate of marketing emails is 20%.
The average click-through rate of those emails is a whimpy 2.43%.
Instead, businesses can enjoy 60% to 80% open rates and click rates between 4x to 10x greater than in email.
This new integration will give businesses a single platform for reaching customers more effectively than email marketing campaigns.

6. Facebook stands to rival WeChat through the integration

If looking at Facebook’s messaging app competition, there is one application that stands above the rest: WeChat.
This app is used across China as a multipurpose platform, something that hasn’t been seen elsewhere due to user fragmentation.
By integrating all three messaging apps though, Facebook will encroach on WeChat’s ubiquity in China and its 1.08 billion monthly active users.

7. Internal restructuring at Facebook is underway

It’s no secret that big changes lead to internal restructuring.
The founders of WhatsApp and Instagram left after Facebook began taking more control over what was previously their own business.
The New York Times also reported staff members citing this new project as reason for departure from the company.

8. Marketers who act fast with chat marketing will gain the most

It is not often in the tech world that huge changes such as this come along.

If you’re building a unicorn business, you’re looking for every advantage.
Dive into MobileMonkey ASAP to integrate chat into your marketing stack.
Odds are you’ll be the first in your market to take advantage of best-of-class engagement and response rates.

Read more at https://www.business2community.com/facebook/8-things-you-should-know-about-the-facebook-messenger-instagram-and-whatsapp-integration-02169220

Russia is considering shutting down its internet connection for a while!

To test the security of its data, Russia is considering disconnecting its Internet service for a short period of time. The test will affect all the data sent by Russian citizens or organizations as Internet access would be limited only within the national territory, meaning that they will not be routed internationally.

The test has no set date but reports indicate that it will happen before April 1st. The bill called “The National Digital Economy Program” that determines the changes needed for the internet to be operated independently was submitted to Parliament in 2018.
The NDEP bill calls on Russian Internet service providers (ISPs) to develop operating capacity should foreign powers move to isolate Russia from the online world. For instance, NATO, which includes the US and its allies, have already threatened to penalize Russia over cyber attacks and other online crimes for which the country is accused.

The measures described in the law comprise a Russian version of the Domain Name System (DNS). In this way, the Internet in the country could work even if the connections with international servers are cut off.
There are 12 organizations that oversee DNS base servers and none of them are in Russian territory.
The test will involve ISPs to demonstrate the ability to route data to government-controlled routing points. The traffic will be filtered, so the information sent between Russians will arrive at their destinations.
Furthermore, the Russian government wants local traffic to pass entirely through these routing points. However, there are those who believe that this is part of efforts to develop a mass censorship system similar to what is seen in China, where any suspicious traffic is blocked – until proven otherwise.

According to Russian news agencies, the providers are truly supportive of the bill’s goals, but are unsure how to do it. They believe the test will cause major disruptions in data traffic in Russia, as ZDNet reported.
This is not the first time that the Putin administration has come up with such an idea. In 2013, after Edward Snowden leaked classified NSA documents, the Federal Protective Service in Russia bought 20 typewriters to prevent sensitive information from leaking via electronic means.

Amidst accusations of its worker's carrying on espionage,MTN uganda sacks its general manager of corporate services, mr Anthony katamba

MTN- Uganda has Tuesday afternoon sacked its General Manager of Corporate Services, Anthony Katamba, TrumpetNews has reliably learnt.
Katamba held many positions including Head of Legal and Communications before rising through the ranks as one of the powerful Ugandans at the Telecom company.
He has worked at the telecommunications facility for close to two decades.

Katamba’s woes began when three of MTN foreign workers were repatriated by Ugandan authorities on grounds that they had breached national security and therefore deemed a threat.
Olivier Prentout a French national headed of marketing and Anne Tabura from Rwanda who headed sales and distribution were the first to be deported and later followed BY Elsa Mussolini an Italian who later told her workmates that she was accused of funding Bobi Wine.
Mussolini was overseeing mobile money at the company.
Earlier on Tuesday evening, an online publication, Watchdog indicated that Katamba had vowed to mastermind the deportation of MTN CEO, Wim Vanhelleputte.
“He crossed the line when he said the CEO would also be deported like three other former MTN honchos,” Watchdog reported.
When this website contacted a source he confirmed to us, that Katamba was shown exit.
“He has vowed to fight and deport more expatriates in Uganda,” a source said without divulging more details.
No MTN official could be reached by the time of filing this report.

Monday, February 11, 2019

Are our cryptocurrencies secure?

android play store malware
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users.

The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to attackers, ESET researcher Lukas Stefanko explained in a blog post.

Since cryptocurrency wallet addresses are made up of long strings of characters for security reasons, users usually prefer copying and pasting the wallet addresses using the clipboard over typing them out.

The newly discovered clipper malware, dubbed Android/Clipper.C by ESET, took advantage of this behavior to steal users cryptocurrency.

To do this, attackers first tricked users into installing the malicious app that impersonated a legitimate cryptocurrency service called MetaMask, claiming to let users run Ethereum decentralized apps in their web browsers without having to run a full Ethereum node.

Officially, the legitimate version of MetaMask is only available as a web browser extension for Chrome, Firefox, Opera, or Brave, and is not yet launched on any mobile app stores.

However, Stefanko spotted the malicious MetaMask app on Play Store targeting users who want to use the mobile version of the service by changing their legitimate cryptocurrency wallet address to the hacker's own address via the clipboard.
As a result, users who intended to transfer funds into a cryptocurrency wallet of their choice would instead make a deposit into the attacker's wallet address pasted by the malicious app.

"Several malicious apps have been caught previously on Google Play impersonating MetaMask. However, they merely phished for sensitive information with the goal of accessing the victims' cryptocurrency funds," Stefanko said.

"Android Clipper targeted Bitcoin and Ethereum cryptocurrency addresses when being copied in to clipboard and replaced them with the attacker’s wallet address. Once this transaction is sent, it can not be canceled."

Stefanko spotted the malicious MetaMask app, which he believes was the first Android Trojan Clipper to be discovered on Play Store, shortly after its introduction to the app store on February 1.

Google took down the malicious app almost immediately after being notified by the researcher.

While the bitcoin price has been dropped steadily since hitting its all-time high in December 2017, there is no reduction (in fact rise) in the cryptocurrency scandals, thefts, and scams that continue to plague the industry.

Just last week, The Hacker News reported how customers of the largest Canadian bitcoin exchange QuadrigaCX lost $145 million in cryptocurrency after the sudden death of its owner who was the only one with access to the company's cold (offline) storage wallets. However, some users and researchers are suggesting the incident could be an exit scam.

Clipper malware on Android play store

This is the first ever Clipper malware found on Play Store.


Another day another Android malware on Google Play Store – This time the IT security researchers at ESET have discovered a malware known for replacing the content of clipboard on the targeted device. This type of malware is called Clipper malware.
The malware was targeting Android users through a malicious application available on Play Store and its prime focus was to collect login credentials and private keys from the victim’s computer to steal Ethereum funds. The malware can also replace a Bitcoin or Ethereum wallet address copied to the clipboard with the one belonging to the attacker
Dubbed Android/Clipper.C by researchers; the malware takes advantage of the fact that cryptocurrency users do not normally enter the addresses of their online wallets manually. Instead of typing, users tend to copy and paste the addresses using the clipboard. That is where the malware replaces the address of the victim with another belonging to the attacker.
The malware was originally found in the MetaMask app which is a browser plugin that allows users to make Ethereum transactions through regular websites. The plugin is currently available on Chrome, Firefox and Brave browser however the company does not have an app for Android or iOS devices which means that attackers were using a fake version of MetaMask to steal their funds.
Clipper malware on Play Store replaces victim's BTC & ETH wallet address
Screenshot of the fake MetaMask app (Image credit: ESET/Play Store
It (Clipper) intercepts the content of the clipboard and replaces it surreptitiously with what the attacker wants to subvert. In the case of a cryptocurrency transaction, the affected user might end up with the copied wallet address quietly switched to one belonging to the attacker., saidESET’s malware researcher Lukáš Å tefanko.
It is worth mentioning that the clipper malware first appeared in 2017 on Windows platform while in 2018, the malware was spotted in applications on a third-party Android store. Now in February 2019, this malicious clipper is discovered on Google Play Store.
At the time of publishing this article; the malicious app was removed from Play Store after ESET informed Google but the presence of Clipper malware on the Store raises a question mark on the way Google scans applications before allowing them on the marketplace.

A look at BTC and ETH addresses associated with the malware shows that so far attackers have received 0.12868189 BTC which is about $466 while and 0.00909752827411204 ETH which is about only $1.08.
This, however, is not the first time that malware with address replacing capability has targeted users. Previously, “ClipboardWalletHijacker” malware was also found replacing wallet address to steal Bitcoins and Ethereum funds. Moreover, CryptoShuffler TrojanComboJack Malware and Evrial Info-Stealing Trojan were also identified replacing wallets to steal cryptocurrency.
Android users especially those dealing with cryptocurrency through their Android phones should watch out for this malware as its presence in other apps is quite possible.
Before downloading an app from the Play Store, users are advised to always check the official website of the application developer or service provider for the link to the official app. Otherwise, refrain from downloading the desired app.
Also, avoid downloading apps from third-party stores, keep your device updated and scan it with a trustworthy anti-virus on regular basis. Here is a list of top 10 anti-virus software for 2019 compiled by us. Stay safe online!

Of course!!! The uganda national IDs are not matching to the present day's cyber standards!!!!!!!! There are alot of cards that arent even recognised,


NIRA has put Uganda as a country and Ugandans in a very hazardous situation as far as Information security is concerned.  All the concerned agencies; NITA, UCC and Ministry of ICT need to up their game and invoke their mandate to bring NIRA to order. It seems to me that all the investment by government in the National ID project is a complete waste. I wish to substantiate my contention. But before going into details, I wish to capture your attention to NIRA outlets, see those long queues of Ugandans suffering to secure an authentic ID, do you know why those queues never reduce day in, day out?
I am aware of the fact that the Ugandan National ID platform depends on large-scale database and bio-metrics technology.  These are critical aspects to the countries surveillance, security and citizenship.
I followed all laid procedure and obtained a National ID which expires on 09th November 2024. On 15th May 2018, I went to buy a new sim-card at one of the telecom shops. I was subjected to the new procedure of scanning my national ID to verify validity. I found that alright. My shock was when the biometric device tried to verify my left thumb print. It could not match which what was scanned on my national ID. The telecom staff tried several devices but none could match. This was around 1pm in the afternoon. I later found out that almost all verification that day were not successful. The telecom staff simply told me to go to NIRA for data recapture. This was the same solution they were giving to all clients that day. As an information security specialist, many things run in my mind but most importantly was if the data on these National IDs is authentic. Definitely it is not.
This I can prove to NIRA if given chance. Solution is I have to get a new ID because the current technology in use cannot even edit this data. A new one has to be produced. Question is, of all National IDs that have been given out since project started, how many have accurate data? This can be proved by the queues of Ugandans at NIRA who wish to do ID replacements, simply because the biometric data found on their IDs does not match with actual data. What does this mean, all ID produced are a waste. How much money was spent for this process before National ID issuance? All that I am trying to say above is what we call data integrity in Information security.
Data integrity is the assurance that data records are accurate, complete, intact, and maintained within their original context, including their relationship to other data records and aims to prevent unintentional changes to information. It refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle, including the usage of any system which stores, processes, or retrieves data.
Ensuring data integrity means protecting original data from accidental or intentional modification, falsification, malicious intent (fraud), or even deletion (data loss). Data integrity and security are closely linked because Integrity as an attribute of Information Security TRIAD (CIA – Confidentiality, Integrity and Availability).
Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it: Access must be restricted to those authorized to view the data in question. It is common, as well, for data to be categorized according to the amount and type of damage that could be done should it fall into unintended hands. More or less stringent measures can then be implemented according to those categories.
Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people or data must be kept accurate from capture stage to usage stage.
Availability is the situation where information is available when and where it is rightly needed. The main concern in the CIA triad is that the information should be available when authorized users need to access it. Availability is maintained when all components of the information system are working properly. Problems in the information system could make it impossible to access information, thereby making the information unavailable.
What is the implication of the above 3 Information security goals?
The CIA triad goals are basic factors in information security. Information security protects valuable information from unauthorized access, modification and distribution. The CIA triad guides information security efforts to ensure success. There are instances when one of the goals of the CIA triad is more important than the others. It is up to the ICT team, the information security personnel, or the individual user to decide on which goal should be prioritized based on actual needs. Thus, the CIA triad requires that organizations and individual users must always take caution in maintaining confidentiality, integrity and availability of information.
For the case of NIRA in my situation, data Integrity was breached. I have not taken time to examine the other 2 information security goals (Confidentiality and availability). But in most cases a breach in one goal breaches all the goals. This means all the investment in this project is a waste and Ugandan cannot benefit.  This could be the reason why the government has completely failed to offer e-services to the citizens. In my opinion, it is one organization that has successfully achieved the e-services goal that is Uganda Revenue Authority. But with NIRA as the central point for citizen database, Uganda has a long way to achieve e-services. Nothing can be achieved with such a mess at NIRA. My situation also proves what I have been reading in the media about NIRA management. Most likely there is a competence issue in that place.
As of now, I and millions of Ugandans cannot enjoy any service in Uganda whose prerequisite is a national ID. How shall we attain middle income with such situations in government entities? Uganda is blessed with a large number of technical human resource, why can’t they be used to clean up this mess? Ugandans are the ones making countries shine elsewhere, why not Uganda. NIRA needs a thorough overhaul if that investment that government made is to be seen as worth the effort and value for money.
In conclusion, for Ugandan Information and Communication Technology regulators to maintain their reputation if any and move this country forward, Data integrity is one of the most important parameter.  I will in future take time and examine other attributes about citizen’s data at NIRA. These could be some of the reasons why for long Uganda does not score well on the Global ICT development Index.
The Writer is an ICT specialist with 15 years of experience in ICT management, ICT Infrastructure, Information Security and  Project management.

Header advertisement