NEWS ANALYSIS | Nigeria: From Misinformation to SIM Loopholes — NITDA’s Digital Shield Faces Security Test

by TheDiggerNews Intelligence Unit

Table of Contents

As Nigeria confronts banditry, terrorism, and viral falsehoods, NITDA’s framework for crisis communication faces scrutiny: is the Agency meeting its 2007 mandate, and can telecom operators truly absolve themselves of complicity in extremist access to SIMs?

Director‑General of the National Information Technology Development Agency (NITDA), Kashifu Abdullahi, recently called for efforts to transform the torrent of online misinformation into a “digital shield” for the nation.

Abdullahi made the call in a keynote address at a national symposium on digital innovation in crisis communication, titled “Leveraging Emerging Technologies to Transform Crisis Communication,” on Monday in Abuja.
The symposium, hosted by the National Defence College (NDC) and organised by the Centre for Crisis Communication (CCC), highlighted how the speed of a crisis has leapt from the “physical messenger” era to the click‑of‑a‑mouse age.
“Twenty‑five years ago, a crisis moved at the speed of a newspaper; today it races at the speed of a click,” Abdullahi said.
He framed misinformation as a national‑security threat and proposed a three‑pillar response: transparent takedown processes, robust content statements, and multi‑stakeholder governance — backed by a Code of Practice requiring major platforms to register locally, pay taxes, and maintain direct channels with the government.
He also cited platform enforcement statistics (Google, LinkedIn, TikTok), noting that they collectively removed over 50 million accounts for violating their rules. The DG also flagged a forthcoming Online Harm Protection Bill and a crisis management centre to unite civil society, security agencies, and big tech.
Oversight in Addressing Information Management

In considering how to transform the “torrent of online misinformation” into a digital shield, it was perhaps an oversight on NITDA’s part not to address information management. Releasing sensitive national security information can be just as dangerous — if not more so — than misinformation itself.

This raises a critical question: Is there an oversight in focusing narrowly on “informants” and “bandits”?
Core issue:
NITDA‘s emphasis on misinformation, while overlooking safeguards for sensitive information, often leads to its leakage to bandits and terrorists by informants.  
It narrows a broad ecosystem problem (algorithmic amplification, coordinated inauthentic behaviour, panic rumour cycles, doxxing, and geolocation leaks) to a single vector — human informants. That framing risks sounding reactive rather than systemic.
What’s missing:
Operational disinformation pipelines: Botnets, paid influence farms, and cross‑platform content laundering.
Crisis data governance: Rules for protecting sensitive location data, citizen footage, and emergency channels.
Independent oversight: Clear guardrails to prevent over‑removal or politicised takedowns.
Although this does not invalidate NITDA’s approach, it exposes a vacuum between platform policy dialogue and field realities in the North‑East, North‑West, and, increasingly, the North‑Central, where insurgents exploit both connectivity and rumour dynamics.
Mandate Compliance: Is NITDA Meeting the 2007 Act?
The NITDA Act (2007) tasks the Agency with planning, standardisation, application, coordination, monitoring, evaluation, and regulation of IT practices nationwide.
Where it aligns:
Active in policy instruments such as the Code of Practice for platforms.
Coordination with the Data Protection Commission.
Drafting of the Online Harm Protection Bill.
Push for a Crisis Management Centre to bind security agencies, tech firms, and civil society.
Where the gap remains:
Lagging in field enforcement. Translating platform compliance into reduced crisis-rumour velocity in conflict states has proven difficult.
Need for metrics beyond takedowns, such as measuring panic‑reducing interventions (time to debunk, reach of corrections, adoption of trusted channels).
Need for public auditability through periodic publication of independent audits on takedown accuracy, false positives, and appeal outcomes.
Verdict:
NITDA is active at the policy and coordination layers. The shortfall lies in measurable outcomes at the last mile—states, LGAs, and crisis hotspots.
Telecom Accountability and Extremist Access to SIMs
How extremists get connectivity: Findings reveal that bandits obtain SIMs through informal markets, proxy registration, and cross‑border spill‑overs.
They are also said to access SIMs through pre‑registered SIMs sold in open markets, weak KYC enforcement, recycled numbers, and the use of identities of the deceased or distant registrants, linked to corruption within retail chains and through SIMs procured in neighbouring countries and used near porous borders.
Can telcos absolve themselves?
Not totally. Operators sit at critical control points, including: KYC, SIM lifecycle controls, geofencing of illegal base stations, and anomaly detection in bulk activations. It’s also revealed that lapses in distributor oversight and channel audits keep the informal market alive.
However, security agencies and regulators also share responsibility — from the design and enforcement of SIM registration policies to shutdown protocols, lawful intercept governance, and border cooperation.
What NITDA Can Do vis‑à‑vis Telcos?
Data standards: Define real‑time KYC verification APIs, audit trails, and tamper‑proof onboarding logs.
Interoperable registries: Push for a unified identity‑SIM binding that flags duplicates across operators.
Anomaly analytics: Mandate operator‑level detection/reporting of suspicious activation clusters in conflict LGAs.
Compliance dashboards: Publish quarterly reports on activations, deactivations, KYC failures, and penalties.
These steps align with NITDA’s mandate to standardise and coordinate IT systems, and complement the sector regulator (NCC) in telecom enforcement.
Until Nigeria closes both the misinformation gap and the SIM loophole, the promise of a digital shield will remain fragile — and national security exposed.

You may also like

Leave a Comment

TheDigger News Menu:
-
00:00
00:00
Update Required Flash plugin
-
00:00
00:00