How Kenya Plans to Empower Courts and Security Agencies to Deactivate Devices Behind Terrorist, Extremist, and Fraudulent Online Activities

How new legal powers could extend into everyday devices and online platforms, raising questions about oversight, reach, and unintended consequences


Kenya is set to give security agencies unprecedented authority over the digital space. Under proposed amendments to the Computer Misuse and Cybercrimes Act, 2018, law enforcement officers and designated cybersecurity experts could deactivate mobile phones, computers, and websites linked to criminal activity. Court approval is mandatory, ensuring judicial oversight before any intervention.

The change responds to persistent threats, from terrorism and child exploitation to extremist religious content. It represents more than a technical tweak—it shifts the state from monitoring to active digital intervention.

Section 46A and the Scope of Control

Central to the amendment is Section 46A, which allows an authorised person to petition a court for content removal or system shutdown. Courts can require convicted offenders to deactivate devices and platforms used in criminal activity.

While designed to anchor enforcement in legality, questions linger: How will courts define “use” in promoting illicit content? What safeguards exist to prevent overreach or errors? The law promises control but also opens complex debates about digital boundaries.

Defining the Digital Target

The legislation adopts a wide lens. A “computer system” now includes physical and virtual devices performing storage, communication, or control functions. Even components of a system fall under scrutiny, meaning smartphones, servers, and networked devices are all covered.

This breadth ensures modern enforcement can keep pace with technology, but it introduces practical challenges. How do authorities isolate a device without affecting wider networks? The law’s ambition is clear, but execution will demand precision.

Beyond Shutdowns: Addressing Modern Cyber Risks

The Bill also expands Section 27 on cyber harassment and phishing, and introduces a measure criminalising unauthorised SIM-card swaps, with penalties including fines of KSh 500,000 or three years’ imprisonment.

SIM-card fraud fuels identity theft and financial crime, showing that digital threats extend beyond violent or extremist content. By targeting these vectors, lawmakers aim to tackle the subtler but equally disruptive elements of cybercrime.

Oversight Meets Enforcement

The Bill is under close review at the Committee stage, with MPs examining clauses before final approval and presidential assent. Requiring court orders is meant to prevent arbitrary shutdowns, but open questions remain: cross-border content, potential errors, and the impact on legitimate research or journalism.

The tension is palpable. The law gives teeth to enforcement, yet every action carries the risk of unintended disruption in a rapidly digitising society.

The Digital State in Action

These amendments signal a decisive approach: Kenya is stepping off the sidelines of digital monitoring and into direct intervention. Online criminals are agile, often using encryption and foreign platforms to evade detection. This law attempts to tilt the balance in favour of state oversight.

If applied carefully, it could reduce exploitation and extremist propaganda. Missteps, however, could suppress lawful online activity and generate broader friction between the state and digital citizens.

When the State Pulls the Plug on Digital Crime

Kenya’s cybercrime device shutdown proposal isn’t just a legal tweak—it signals a deeper recalibration of power in the digital realm. By granting authorities the ability to deactivate devices linked to terrorism, child exploitation, and other cybercrime, the law moves enforcement from passive monitoring to direct intervention.

Judicial oversight remains the anchor, but success will hinge on precise implementation. How courts interpret “use” in criminal activity, how cross-border content is managed, and how safeguards prevent collateral disruption will all determine whether the law curbs exploitation or inadvertently chills lawful online activity.

In a society where smartphones, online platforms, and digital services are integral to daily life, the stakes are high. Kenya’s move could set a precedent for balancing state authority and individual digital rights in a rapidly evolving cyber landscape.

Go to TECHTRENDSKE.co.ke for more tech and business news from the African continent.

Mark your calendars! The TechTrends Pulse is back in Nairobi this October. Join innovators, business leaders, policymakers & tech partners for a half-day forum as we explore how AI is transforming industries, driving digital inclusion, and shaping the future of work in Kenya. Limited slots – Register now – here.

Follow us on WhatsAppTelegramTwitter, and Facebook, or subscribe to our weekly newsletter to ensure you don’t miss out on any future updates. Send tips to editorial@techtrendsmedia.co.ke

TechTrends Media Podcasts

The TechTrends Podcast

The GreenShift Podcast

Facebook Comments

By George Kamau

I brunch on consumer tech. Send scoops to george@techtrendsmedia.co.ke

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button