He rose suddenly from the IT World, conquering the corridors of celebrities in Tanzania due to his ability to post damning pictures online with some of these pictures showing celebs and politicians naked, before he was nabbed this week in Essex, UK.
The man behind the reckless website that has highly damaged the reputation of over 6,000 Tanzanians including the head of state was arrested in a well planned move coordinated by the Tanzania intelligence community and their counterparts from UK and Israel, The Guardian on Sunday has learnt.
According to the well placed sources within the Interpol, just a few days after the report that damning cropped pictures purportedly showing the head of state were posted online, the intelligence communities tasked its IT experts to track down the culprit behind the defamatory website.
To nab the host of the website, local IT experts from the intelligence communities contracted their counterparts from Israel who helped tracing the real host and author of the popular website known as ze utamu.
After conducting a thorough investigation to various local Internet Service Providers, it was concluded that the server that host the website originated in the United Kingdom.
This, according to sources, was reached after analysing over one hundred posts posted in the website whereby their origins finally showed the country's code used in hosting internet services.
Following that link, local IT experts from Intelligence Communities contacted their counterparts in UK mainly from MI5, in order to establish the person behind the website.
The investigation within UK was conducted by experts whereby finally the real suspect behind the website was located after his Internet Service Provider was identified.
The ISP provider was interrogated thoroughly and finally the experts established the real identity of the man whose website has defamed and offended a total of 6,080 prominent Tanzanians, including politicians, celebrities and others.
The dramatic move by the local intelligence communities is the first to be done in East Africa in cracking down online crimes, sending an alarming message to the growing number of bloggers inside and outside the country.
Perhaps the most disturbing question is that the man behind this damning website is a highly trained IT expert who was educated by taxpayers' money and has a link to some of the prominent political figures in the country.
The investigators are still conducting thorough investigations to establish other local suspects who have been collaborating with the blogger to post damning and defamatory pictures online during the past few months.
After concluding their findings, the investigators tipped Interpol as required by international law in order to arrest the suspect.
Interpol working on the tips from intelligence officials raided the home of the suspect early this week in Essex, UK, and arrested the suspect who is a Tanzanian national.
The Tanzanian national aged 39 years old is an expert in IT with strong command in both written and oral English, Chinese and Swahili languages.
"When you rattle the snake get prepared for its reactions…You can't mess around with people including the head of state and expect to walk freely, " a senior official from the Interpol told The Guardian on Sunday under conditions of anonymity.
GUARDIAN ON SUNDAY
:: IPPMEDIA
Link inaenda kwenye homepage ya IPP na siyo kwenye article yenyewe. Kama ukifungua link search tu article utaiona.
IPP Media nao useless kama waandishi wake...nikisema mnasema mimi nina kisasi nao
this is typical udaku
1) Kwanza MI5 hawana muda wa kushughulika na mambo haya...hawa jamaa wako bize wanashughulishwa na AQ na sleeper cells ...hii issue ni ndogo sana Scotland Yark wanazo resources za kutosha bila kuwashirikisha MI5 na actually huko Yark kwenyewe mbali sana
2) Hapo kawataja ISRAEL sasa ukisikia sensationalism ndio hii...hivi Israel wanahusika vipi hapa na kama nani? MOSAD, SHIN BET au KIDON kwa kwa lipi haswa? Mind you jamaa wako bize kupenetrate Hezbollah na hata time line inaendana na Elections in Lebanon ambako tunjua waIsrael walikuwa bize kufanya nini na Saudi Arabia mpaka Hariri akawashinda...sasa waache jambo la muhimu kama hilo waje kushughulikia kumkamata jamaa wa ZE UTAMU?
ukisikia SUPERMARKET JOURNALISM ya akina Mwanakijiji ndio hiii
3) CYBER CRIMES zipi haswa? kwa sheria ipi? mimi nazielewa vilivo sheria za cyber crimes za Tanzania na hakuna sehemu hata moja ambayo jamaa anaweza kushitakiwa just to name a few:
-The Computer Misuse Act 1990 ( soma chapter 18.)
-The Regulation of Investigatory Powers Act 2000 (kasome chapter 23.)
-The Anti-terrorism, Crime and Security Act 2001 (kasome chapter 24.)
-The Data Protection Act 1998 (kasome chapter 29.)
-The Fraud Act 2006 (kasome chapter 35.)
-Potentially the Forgery and Counterfeiting Act 1981 (soma chapter 45) mind you sheria hii pia inaweza kuhusika kwenye kesi za FORGERY OF ELECTRONIC PAYMENTS lakini hii ni within UK
The Privacy and Electronic Communications (hiii ni EC Directive) Regulations 2003 (hii inapatkana kwenye Statutory Instrument ya mwaka 2003 No. 2426.)
kila nikiwaambia haya magazeti ya IPP Media hamna kitu hamuishi kulalama sasa mmeona?
Sasa hivi ukitembelea forums za IRANIAN community mtaona jinsi AHMEDINAJAD anavyochkrwa na kufanywa photoshop...mind you sheria za UK zinaruhusu kabisa swala hilo ama sivyo kusingewkepo magazeti UK
3)Hilo la ISP kuwa interrogated nalo ni uwongo mtupu kwa sababu sheria ya Computer Misuse Act 1990 haijasema lolote kuhusu kuphotoshop picha za watu..isipokuwa kipo kipengele ambacho kinaelezea kuhusus uhalifu au wakudhuru watu au wa ulawiti watoto ..hilo wazungu hawana cha mswalie mtume
sasa kwa kumpasha huyu mwandishi wenu wa IPPMEDIA ni kwamba hiyo a
Act iliintroduce three criminal offences kama zifuatazo:
1(1) A person is guilty of an offence if:
a) he causes a computer to perform any function with intent to secure access to any program or data held in a computer;
b) the access he intends to secure is unauthorized; and
c) he knows at the time when he causes the computer to perform the function that this is the case.
1(2) the intent a person has to commit an offence under this section need not be directed at
a) any particular program or data
b) a program or data of any particular kind; or
c) a program or data held in any particular computer.
1(3) a person guilty of an offence under this section shall be liable on summary conviction to imprisonment for a term not exceeding six months or to a fine not exceeding level 5, on the standard scale or both.
2(1) a person is guilty of an offence under this section if he commits an offence under section 1 above ("the unauthorized access offence") With intent
a) to commit an offence to which this section applies; or
b) to facilitate the commission of such an offence (whether by himself or by any other person) and the offence he intends to commit or facilitate is referred to below in this section as the further offence.
2(2) this section applies to offences
a) for which the sentence is fixed by law; or
b) for which a person of twenty one years of age or over (not previously convicted) may be sentenced to imprisonment for a term of five years (or in England and Wales might be so sentenced but for the restrictions imposed by section 33 of the Magistrates Courts Act 1980).
2(5) a person guilty of an offence under this section shall be liable
a) on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or both; and
b) on conviction on indictment, to imprisonment for a term not exceeding five years, or to a fine, or both.
3(1) A person is guilty of an offence if
a) he does any act in a way which causes the unauthorized modification of the contents of any computer; and
b) at the time when he does so the act he has the requisite intent and the requisite knowledge.
3(2) for the purposes of subsection 3(1)b above the requisite intent is an intent to cause a modification of the contents of any computer and by so doing
a) to impair the operation of any computer;
b) to prevent or hinder access to any program or data held in any computer; or
c) to impair the operation of any such program or the reliability of any such data.
3(3) the intent need not be directed at
a) any particular computer;
b) any particular program or data or a program or data of any particular kind; or
c) any particular modification or a modification of any particular kind.
3(4) For the purpose of subsection 1b above, the requisite knowledge is knowledge that any modification he intends to cause is unauthorized. 3(5) it is immaterial for the purposes of this section whether an unauthorized modification or any intended effect of it of a kind mentioned in subsection (2) above is, or is intended to be, permanent or merely temporary.
lakini hao ndio IPPMEDIA..Guardian la Tanzania ukilisoma kwanza kazi yake kubwa ni ku copy from Guardian UK na kupaste, KULIKONI linahaririwa na wendawazimu halafu THIS DAY halina hata hadhi ya kuitwa Gazeti
no wonder mimi huwa nasoma THE CITIZEN maana kidogo lina mwelekeo wa professional journalism kwa kiasi fulani
On MALE since sina enough data nitaachana na mambo ya speculation mpaka hapo nitakapo ona yuko kizimbani hapo ndio tutaingia chimbo kujua kashitakiwa kama raia wa wapi na kwa kosa gani kwa kutumia sheria zipi
Hiyo haiondoi ukweli kuwa i miss za utamu