How Telcos Track You—and How to Stay Private in Kenya
The growing use of mobile phones for everything—from communication to banking—has turned telecom providers into powerful gatekeepers of personal data. In light of the Albert Ojwang case and recent public concern, it’s vital to understand how telcos track you and how to minimize your digital footprint.
Whether it’s through SIM registration, cell tower pings, or your M-Pesa transactions, telcos know more about you than you may think.
1. SIM Card Registration and Metadata Tracking
In Kenya, registering a SIM card requires your national ID, linking your phone number directly to your identity. Every call, message, or data session creates metadata, which includes:
- Who you contacted
- Time and duration of the communication
- Your phone’s location during the event
This data doesn’t include content but can reveal patterns that are often more powerful than the words themselves. For example, surveillance operations in Nigeria used metadata to track activists without needing to read their messages.
2. Location Tracking Through Cell Towers
Even when GPS is off, telcos still track your location using cell tower triangulation. Your phone constantly connects to nearby towers. When at least three towers are involved, your location can be estimated within 100 to 500 meters—even closer in cities.
Law enforcement often uses this method for real-time tracking, as documented by Privacy International in multiple African nations.
3. Internet Use and App Behavior
Telcos providing internet services collect:
- Domains you visit, even with HTTPS
- App connection times, like when you open WhatsApp
- Data usage patterns, such as spikes in downloads or video calls
Though your content might be encrypted, your behavioral patterns aren’t. A telco might not know what you said on Signal, but it knows how often you use it—and at what times.
4. Mobile Payments and Utility Data: A Dangerous Combination
Kenya’s deep reliance on mobile money, especially M-Pesa, adds another surveillance layer. When you buy KPLC tokens, for example:
- Your phone number is tied to your national ID
- The token purchase links to your home address via meter number
- Safaricom and KPLC both store this transaction trail
This data, when combined with call logs or app usage, builds a highly accurate profile of your daily life, movements, and residence. As seen in recent Channel 7 Kenya coverage, this integration has raised alarm bells.
Can Authorities Access This Data?
Yes—but only under specific legal conditions. Kenya’s Data Protection Act (2019) says telcos can share user data only when:
- A valid court order is issued
- There’s a national security request backed by law
Unfortunately, legal loopholes and lack of oversight often result in silent, informal data requests. In 2022, Mozilla Foundation highlighted the weak enforcement of data rights in Kenya.
How to Protect Yourself: Practical Tips
While you can’t avoid all tracking, you can limit your exposure with a few smart steps:
Use Encrypted Messaging Apps
Apps like Signal hide both your message content and metadata. WhatsApp also offers end-to-end encryption, though it still logs metadata.
Mask Your Location
- Disable location services when unnecessary
- Use VPNs to hide your IP and traffic patterns
- Turn off your phone at events, protests, or when traveling to sensitive places
Limit M-Pesa Use for Sensitive Actions
Avoid making political donations or utility payments tied to personal addresses through your primary phone number.
Use a Secondary SIM (Where Legal)
Kenya requires ID-linked SIMs, but using a separate line for non-essential communication can help separate your identities.
Turn Off Unused Features
Disable Bluetooth, GPS, and background data when not in use. Small changes reduce data leaks significantly.
Conclusion: Digital Awareness Is Self-Defense
Understanding how telcos track you isn’t just technical jargon—it’s about civil rights. As mobile services expand, the boundaries between convenience and control are blurring. From KPLC tokens to app activity, every tap on your phone could potentially reveal where you are, who you talk to, and what you care about.
In a country grappling with political unrest and surveillance concerns, protecting your digital footprint is not just smart—it’s essential. By being aware and proactive, you can reduce your vulnerability and reclaim a measure of control in an increasingly connected world.




