As Namibians Rush to Register SIMs, Major Telco Hoards Biometric Data

This December, citizens of Namibia are faced with a catch-22.
In 10 days, more than half of the population of Namibia may lose phone service.
As a price for keeping it, the other half has handed over sensitive biometric data to the country's premier telco.
In an effort to combat mobile fraud and identity theft, and generally align with international norms, the Namibian government began a yearlong push for all citizens to register their SIM cards.
Most of those citizens have to do so through Mobile Telecommunications Limited, Namibia's first and largest mobile telecommunications provider.
MTC controls more than a 90% share of the market, servicing over 2 million customers in the country of just 2.5 million, according to company documentation.
In registering their SIMs the company has also collected customers' facial scans and fingerprints.
Namibia Failing Push to Register SIMs Namibia's SIM registration campaign hasn't gone according to plan.
The Communication Regulatory Authority of Namibia has reported that, as of this month, just 43% of the country - 1,043,144 of 2,463,367 total mobile phone users - have completed registration.
Rowney adds that this week, to speed up compliance, the government rescinded one step in the process: obtaining a declaration from the police prior to registration.
A representative of the Ministry of Information and Communication Technology told The Windhoek Observer that, despite poor adherence, the government will not push the registration deadline.
Those numbers will be lost to their original owners.
Rowney, for his part, does not believe the telcos will comply with such a firm stance.
It should be noted that the majority of MTC is owned by the government, as well as the entirety of its sole competitor, Telecom Namibia.
MTC's Biometric Data Collection Besides the threat of service interruptions, or the theoretical specter of mobile fraud should the plan fail, there's one other risk to this late drama: that MTC will gain further leverage to collect sensitive biometric data.
According to Part 6 of Chapter V in Namibia's Communications Act of 2009, in registering a SIM card, companies must obtain certain standard personal information such as an individual's name, date of birth, address, and a form of government ID. Biometric data is not required by law.
As part of the registration process, MTC employees have been capturing photos and fingerprints of customers.
It's unclear whether the company intends to use this data for a particular purpose.
The confusion is compounded by the fact that Namibia does not yet have any data protection laws.
Its first Data Protection Bill was drafted two years ago and is as yet moving through Parliament.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 21 Dec 2023 14:35:22 +0000


Cyber News related to As Namibians Rush to Register SIMs, Major Telco Hoards Biometric Data

McCaffrey Joins 'ASTORS' Champion SIMS Software Board of Advisors - SIMS Software, the leading provider of security information management software to the government and defense industries - and the 2023 Platinum 'ASTORS' Award Champion for Best Security Workforce Management Solution, is delighted to announce that ...
5 months ago Americansecuritytoday.com
Biometric Authentication in Business: Enhancing Security - With its high level of security, convenience, user-friendliness, and accuracy, biometric authentication is paving the way for the future of secure authentication in the business world. One of the primary advantages of implementing biometric ...
5 months ago Securityzap.com
Biometric Security in Educational Environments - Biometric technology has gained significant attention in recent years as a potential solution to enhance security in educational environments. The adoption of biometric security in educational settings raises important privacy and ethical concerns. ...
6 months ago Securityzap.com
Biometric Authentication: Advancements and Challenges - Advancements in technology are driving the world of biometric authentication into a realm where one's very being serves as the key to accessing secure systems. The Evolution of Biometric Technology has significantly transformed the landscape of ...
3 months ago Securityzap.com
As Namibians Rush to Register SIMs, Major Telco Hoards Biometric Data - This December, citizens of Namibia are faced with a catch-22. In 10 days, more than half of the population of Namibia may lose phone service. As a price for keeping it, the other half has handed over sensitive biometric data to the country's premier ...
6 months ago Darkreading.com
Interpol Arrests Smuggler With New Biometric Screening Database - In November, Interpol arrested a fugitive smuggler using a new biometric security system it plans to deploy across its 196 member countries. The colorlessly named "Biometric Hub" collates Interpol's existing fingerprint and facial-recognition data ...
7 months ago Darkreading.com
Google Removes Foreign eSIM Apps Airola and Holafly from PlayStore - Google has removed Airola and Holafly from its PlayStore for Indian users due to their sale of international SIM cards without the necessary authorizations. The decision came from the department of telecommunications, which also contacted internet ...
5 months ago Cysecurity.news
The future of biometrics in a zero trust world - Biometric data obtained from selfies, forged passports and cyberattacks on data stores holding everything from fingerprints to DNA have long been best-sellers on the dark web. Untraceable yet very powerful in allowing attackers to access the most ...
5 months ago Venturebeat.com
UK to replace physical biometric immigration cards with e-visas - By 2025, Britain is set to ditch physical immigration status documents such as Biometric Residence Permits and Biometric Residence Cards in a bid to make its borders digital, which is in-line with developed countries like Australia. Presently, ...
4 months ago Bleepingcomputer.com
CVE-2013-0135 - Multiple SQL injection vulnerabilities in PHP Address Book 8.2.5 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) addressbook/register/delete_user.php, (2) addressbook/register/edit_user.php, or (3) ...
6 years ago
Chameleon Android Trojan Offers Biometric Bypass - A new variant of an Android banking Trojan has appeared that can bypass biometric security to break into devices, demonstrating an evolution in the malware that attackers now are wielding against a wider range of victims. Spread through phishing ...
6 months ago Darkreading.com
CVE-2017-17713 - Trape before 2017-11-05 has SQL injection via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp ...
6 years ago
CVE-2017-17714 - Trape before 2017-11-05 has XSS via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, ...
6 years ago
Localization Mandates, AI Regs to Pose Major Data Challenges in 2024 - Companies should expect to face a trio of trends in 2024 that make data security, protection, and compliance more critical to operations and risk reduction. Increasingly, governments worldwide are creating laws that govern the handling of data within ...
6 months ago Darkreading.com
CVE-2023-52780 - In the Linux kernel, the following vulnerability has been resolved: net: mvneta: fix calls to page_pool_get_stats Calling page_pool_get_stats in the mvneta driver without checks leads to kernel crashes. First the page pool is only available if the bm ...
1 month ago Tenable.com
Americans Deserve More Than the Current American Privacy Rights Act - EFF is concerned that a new federal bill would freeze consumer data privacy protections in place, by preempting existing state laws and preventing states from creating stronger protections in the future. The bill should limit sharing with the ...
2 months ago Eff.org
New Chameleon Android Trojan Can Bypass Biometric Security - A brand new variant of the Chameleon Android malware has been discovered in the wild, featuring new characteristics, the most notable of which is the ability to bypass fingerprint locks. The Chameleon Android banking malware first appeared in early ...
6 months ago Cysecurity.news
My Yearly Look Back, a Look Forward and a Warning - 2023 saw cybersecurity and privacy law arrive at a crossroads, especially with regard to the regulatory landscape. This is the time of year when it is traditional to look back at the past year and extrapolate forward to make predictions for the year ...
5 months ago Securityboulevard.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
3 months ago Feeds.dzone.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
3 months ago Venturebeat.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
6 months ago Helpnetsecurity.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
3 months ago Feeds.dzone.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Are We Experiencing the End of Biometrics? - Biometric security is often viewed as superior to passwords when it comes to protecting sensitive systems or data. The interface between physical and software security, verified by unique personal identifiers like iris scans, fingerprint scans, or ...
3 months ago Cybersecurity-insiders.com
Data Privacy and Security - Organizations are gradually becoming concerned regarding data security in several instances, such as collecting and retaining sensitive information and processing personal information in external environments, which include information sharing and ...
7 months ago Feeds.dzone.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)