I have been in government for a long time and have sat on the National Security Council. I know what Safaricom does. They have given the DCI access to the backend of their tracking system. DCI officers can now pinpoint your exact location. They can access subscribers’ data at will, without a court warrant. That is what they did to my son. That is happened to Albert Ojwang. When it comes to privacy violations, Safaricom is at the top. They literally hand over their customers to be abducted. I’m not speaking from a point of ignorance—I know exactly what happens between Safaricom and the government. This is a blatant violation of privacy and is against the law.
Having served in high-level government roles, including on the National Security Council, Justin Muturi speaks with unsettling authority. His claims that Safaricom has handed the DCI full backend access—enabling them to track subscribers without legal processes—are deeply disturbing. The ability to pinpoint someone’s location or access their personal data at will undermines constitutional rights and places ordinary citizens at risk. Muturi references the tragic targeting of his son and Albert Ojwang, painting a chilling picture of state overreach enabled by corporate complicity.
What makes these claims even more troubling is the subtle way data trails are exploited. Something as routine as buying KPLC tokens becomes a surveillance tool. With one transaction, your location, house number, and identity become accessible to law enforcement. This raises serious concerns about the misuse of technology and the role of private corporations in eroding public trust and safety.
Privacy is not a luxury—it is a right. If these allegations hold truth, then Safaricom’s actions signal a dangerous normalization of surveillance, coercion, and unlawful state behavior. As consumers, Kenyans must demand transparency and safeguards. Silence and convenience are no longer options when freedom is at stake.



