Close Menu
    Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn TikTok
    TopBuzzMagazine.com
    Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn TikTok
    • Home
    • Movies
    • Television
    • Music
    • Fashion
    • Books
    • Science
    • Technology
    • Cover Story
    • Contact
      • About
      • Amazon Disclaimer
      • Terms and Conditions
      • Privacy Policy
      • DMCA / Copyrights Disclaimer
    TopBuzzMagazine.com
    Home»Science»Nigeria’s government is using digital technology to repress citizens. A researcher explains how
    Science

    Nigeria’s government is using digital technology to repress citizens. A researcher explains how

    By AdminOctober 29, 2025
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Nigeria’s government is using digital technology to repress citizens. A researcher explains how


    technology
    Credit: CC0 Public Domain

    Digital authoritarianism is a new way governments are trying to control citizens using digital and information technology. It is a growing concern for advocacy groups and those interested in freedom and democracy. It is especially worrying for those who initially heralded digital and information technologies as liberating tools that would spread information more easily for citizens.

    I have studied the rise of digital authoritarianism in Africa over the last two decades. My most recent study focused on Nigeria, and its turn to digital tools for control after the 2020 #EndSARS Movement protests.

    I found that local conflict and development needs drive the Nigerian government’s demand for digital authoritarianism technologies. Foreign suppliers of these technologies are motivated by both economic gain and influence in the region.

    The findings are important. Firstly, it signals that the trend of using digital spaces to control populations has reached the African continent. It also shows that the trend is facilitated by foreign actors that provide governments with the technology and expertise.

    What is digital authoritarianism?

    One way to understand the concept of digital authoritarianism is as a form of governance or set of actions aimed at undermining accountability. It is the use of digital technologies for this goal.

    Technology is used to repress voices, keep people under surveillance, and manipulate populations for regime goals and survival.

    It includes but is not limited to internet and social media shutdowns. It prioritizes the use of spyware to hack and monitor people through their devices. There is mass surveillance using artificial intelligence for facial recognition, and misinformation and disinformation propaganda campaigns.

    What drives it in Africa

    In Africa, these actions are popping up in democracies like Nigeria and in autocracies alike. Perhaps the noticeable difference between these two types of governments is the subtlety of their form of digital authoritarianism and the legal recourse when such actions are unearthed.

    Both governance types make claims of national security and public safety to justify these tactics. For instance, former Nigerian information minister Lai Mohammed claimed the 2020 Twitter ban was due to “the persistent use of the platform for activities that are capable of undermining Nigeria’s corporate existence.”

    Autocracies are often cruder with their use of blatant tactics. They employ internet and social media shutdowns. This is often due to their unsophisticated digital authoritarianism apparatuses. Democracies often rely on more subtle surveillance and misinformation campaigns to reach their goals.

    This all begs the question: what are the drivers of this trend? There are four clear ones:

    • regime survival/political control
    • security and counterterrorism
    • electoral competition and information manipulation
    • modernization agendas (development).

    On the rise

    In the African context, digital authoritarianism is on the rise. There’s a cohesive relationship between the foreign suppliers of the hardware, expertise and domestic demand. This demand stems from authoritarian regimes as well as regimes accessing digital systems to consolidate and modernize. There are also hybrid regimes, which are countries with a mixture of democratic and authoritarian institutions.

    States like China, Russia, Israel, France and the US supply both the technology and instruction or best practices to African regimes. Reasons for supply include economic gain and regional influence.

    On the demand side, African regimes seek out digital authoritarianism tools mainly for development needs and for conflict resolution. Some of the largest consumers are Kenya, Rwanda, Uganda, Nigeria and Ghana.

    Discover the latest in science, tech, and space with over 100,000 subscribers who rely on Phys.org for daily insights.
    Sign up for our free newsletter and get updates on breakthroughs,
    innovations, and research that matter—daily or weekly.

    The study

    I found there was evidence that Nigeria’s development goals and efforts to quell conflicts drive the use of technology to repress its people. Using the example of the #EndSARS movement, social media platform shutdowns and efforts to build a firewall akin to China’s great firewall serve as evidence for this.

    In the days following Twitter’s removal of a post by President Muhammadu Buhari, Twitter was banned in Nigeria. The administration cited its use to further unrest, instability, and secessionist movements. There were claims that this step was taken to maintain internet sovereignty.

    However, the ban also undermined social movements that were successfully holding the government accountable. Following domestic and international outcry over the ban, there were reports that the Nigerian government had approached China. The purpose of the contact was to replicate their “Great Firewall” in Nigeria’s internet control apparatus. (The focus of China’s project is to monitor and censor what can and cannot be seen through an online network in China.) This would allow the state to manage access to certain cities and block unwanted content from reaching Nigerians.

    On the supply side, China’s economic commitments to the country and concerted efforts to cultivate certain norms in the country and region offer insights into the motivations for supply in this case and the broader continent.

    Again, regime type dictates just how these technologies will be used. Interviews conducted with permanent secretaries and ministers of Nigerian ministries were particularly revealing. They confirmed that repressive government practices in the real world are informing their activity in digital spaces.

    For instance, they intimated that the repression that occurs during protests in the streets in order to manage “lawlessness” is being replicated online. Its purpose is to ensure peace and stability.

    For development needs, countries like Nigeria initially seek out foreign suppliers to furnish them with state-of-the-art technology systems. The objective is to establish or refurbish their information and communications technology apparatuses.

    These include, but are not limited to, national broadband networks) such as fiber optic networks, mobile telecommunications networks and smart city governance systems. Though these are often not repressive in nature, they are capable of dual use. Thus, these developmental needs provide technologies that are then utilized in an authoritarian fashion for state-building goals.

    There is also evidence that some suppliers provide instruction on how to use these technologies for repression. In some instances, under the guise of development needs, regimes seek out more repressive tools such as spyware alongside these infrastructural development programs. At this stage, the boundary between development and security blurs, as modernization becomes a vehicle for national security, cyber defense, regime protection, and information control.

    What can be done?

    I propose a three-pronged approach to address the three drivers. First of all, more has to be done on the international front to curb the sale of repressive tools to states. There must be a conversation about the norms of these technologies and their use for repression in both democracies and autocracies.

    On the demand side, it appears those practices that have plagued the hopes of freedom and democracy in the real world have to be addressed. Naturally, no movement on the digital front is complete without a real world manifestation. It seems logical that eradicating digital repression necessitates addressing repression in general.

    Finally, regulatory legal and institutional oversight alongside human rights benchmarks must be achieved. These will accompany digital and privacy rights in cyberspace.

    Provided by
    The Conversation


    This article is republished from The Conversation under a Creative Commons license. Read the original article.The Conversation

    Citation:
    Nigeria’s government is using digital technology to repress citizens. A researcher explains how (2025, October 29)
    retrieved 29 October 2025
    from https://phys.org/news/2025-10-nigeria-digital-technology-repress-citizens.html

    This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
    part may be reproduced without the written permission. The content is provided for information purposes only.

    View Original Source Here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    ‘Miracle’ photo captures Comet Lemmon and meteor seemingly entwined over Earth

    October 28, 2025

    Men may have to exercise more than women to get same heart benefits

    October 28, 2025

    Air pollution sharply raises workplace accident risk, study finds

    October 27, 2025

    Why can pumpkins grow so large, but blueberries can’t?

    October 27, 2025

    Teenager builds advanced robot hand entirely from Lego pieces

    October 26, 2025

    4MOST telescope facility captures first light

    October 26, 2025
    popular posts

    What to Watch: The Family Stallone, XO Kitty, Rainn Wilson

    Jury rules Kevin Spacey is not liable in Anthony Rapp

    Diagnosing Doc Season 1: Scrubs, Scandals, and Second Chances

    Greta Garbo 4-Film Collection Blu-ray Review: Cheap Classic Movies

    Heritage Foundation Uses Bogus Stat to Push a Trans Terrorism Classification

    A Neanderthal-shaped skull may explain why some people get headaches

    Oppo Find N Flip Specifications Tipped, May Feature a 4,300mAh

    Categories
    • Books (3,499)
    • Cover Story (8)
    • Events (20)
    • Fashion (2,576)
    • Interviews (48)
    • Movies (2,799)
    • Music (3,085)
    • News (162)
    • Politics (6)
    • Science (4,650)
    • Technology (2,794)
    • Television (3,524)
    • Uncategorized (932)
    Archives
    Facebook X (Twitter) Instagram Pinterest YouTube Reddit TikTok
    © 2025 Top Buzz Magazine. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms of Use and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    Do not sell my personal information.
    Cookie SettingsAccept
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT