Connect with us

Feature/OPED

What Pentecostal Pastors Have in Common With Politicians

Published

on

Mike Owhoko May Nigeria Never 9th National Assembly

By Michael Owhoko, PhD

The disparity of roles between ecclesiastics and politicians is generally expected to translate to differences in values, lifestyles and creeds, but this pattern has been disrupted and bridged in Nigeria by materialism.  Moral disconnects, lust and insatiability for money, wealth, fame, influence and power have conspired to bring the men of God to the level of politicians.  This is evident in the Pentecostal ministries where some founding pastors and general overseers {GOs} no longer exhibit ascetic dispositions and restraints from material allures.

Men of God are ordained servants positioned to constantly communicate God’s values and the work of Jesus Christ for the redemption of mankind with humility and sacrifice, not as businessmen and women with devotion of brewed capitalists, displaying affluence like politicians.  Politicians are elected political office holders with the responsibility of running the government to primarily provide welfare and security of lives and properties for the people, but opt to make politics a career and business for generating wealth for themselves.

With similarities in affluence and avarice, both pastors and politicians now operate in the same frequencies.  They buy private jets, lodge in diplomatic suits in 5-star hotels during local and foreign travels, send their children to expensive schools abroad, buy houses abroad, procure citizenship of foreign countries for themselves and immediate families, live in highbrow areas, enjoy retinue of domestic staff, and site projects funded with church or government money in their villages and home towns.

Besides, they also drive expensive exotic cars and SUVs with convoys of security escorts for protection. The use of escorts by politicians is understandable because they are vulnerable to public attacks owing to the lifestyle of lies and deceit.  But where men of God who preach truth and regularly assure members of divine protection, fail to invoke celestial powers on themselves, but rely on security agencies for defence, leaves much to be desired.

The process for funding their voracious and lavish lifestyles is similar. While politicians deploy all sorts of illusions to embezzle public funds, including the collection and diversion of constituency funds for private interests, some men of God obtain a pecuniary advantage over their members through hoaxes, guilt and fear.  They ensure management of tithes, offerings, seeds and first fruit are under their exclusive preserve, including compelled donations orchestrated to look voluntary, but mechanically designed to appeal to the emotions of congregates.

There is no accountability and transparency.  Financial management and utilization of these sources of income are shrouded in secrecy, except to the knowledge of immediate families of pastors and GOs or a few carefully selected loyal church members.  Members are generally advised not to ask questions on how finances are utilized, as enquiries are viewed as recalcitrant handwork of the devil, and attract consequences ranging from warning, suspension or outright expulsion.

Abroad, the church’s offerings and tithes are classified as charity funds.  There is transparency and accountability.  Members are at liberty to ask for receipts for such levies, as they serve as evidence of contributions to charity.  Such receipts are presented to the government for purposes of tax rebates, enabling members to enjoy tax relief.

Pentecostal churches are not liable to members on how levies and contributions are managed, just like the government where there is no accountability and transparency. Political officeholders use public funds as personal incomes to service their lives. When citizens demand accountability over the management of revenues in the face of glaring corruption, politicians in power are quick to accuse or label such persons as agents of destabilization working for opposition parties.  When such criticism persists, such citizens are either hounded, warned, blackmailed, intimated or silenced, using state security apparatus.

Due to seemingly shared values, politicians who contested elections and won through rigging and other fraudulent processes, are offered opportunities in the Pentecostal churches to offer thanksgiving to God for a “successful” election.  They are even allowed to step on the pulpit to share testimonies and minister to the congregation, with prayers offered to them thereafter, and sometimes, along with prophesies.  Before departure, the politicians make donations to the church, most of which are redeemed with looted funds.

Looted funds are accepted as donations, gifts, seeds, tithes or offerings. Pastors and GOs are not bothered about the sources of funds nor the integrity or character of donors.  As long as it swells the revenue base of the church, it is acceptable.   This is the attraction accounting for the proliferation of Pentecostal churches in Nigeria.  It is doubtful if the Nigerian Bureau of Statistics {NBC} knows the exact number of these churches.  They target locations populated by high net-worth individuals to set up branches to grow their finances, as against rural areas inhabited by the poor.  Lekki in Lagos is a major target, accounting for the high presence of key Pentecostal churches.

While politicians have made politics a lucrative business, violating the purpose of government for selfish interests and gains, these men of God in the Pentecostal movement have also made the gospel a business, failing to resist the lure of earthly wealth under the guise of kingdom expansion pursuit.  While it is true 1 Corinthians nine: 13-14 says preachers can live from the gospel, making it an obligation for church members to support their pastors, men of God have taken this verse out of context by taking advantage of vulnerability and ignorance of members to fund their ostentatious and extravagant lifestyles.

The need to sustain and maintain their expensive lifestyles is also responsible for the absence of clear succession plans. Having tasted power, money and influence, the typical politician is afraid to relinquish office.  Where he is statutorily required to do so, resorts to picking his child or wife or relation or a sponsored successor to take over from him. For them, it is difficult to let go of the wealth and juicy opportunities associated with their offices.

Founding Pentecostal pastors and GOs also deploy similar methods to perpetuate themselves in office. They have no clear succession plans, preferring to foist themselves on the congregates in perpetuity, pretending to be waiting for the Lord to choose a successor, when in fact, they have their children or wives in mind, whom they groom to take over.  They cannot afford to hand over the huge finances of the church to an “outsider”.  It is the reason a Pentecostal church hardly survives beyond the life of its founder, as it slowly slides into extinction after his or her demise.

Also, while politicians regale their audience with promises of taking them out of poverty as a strategy to secure their votes, some of these Pentecostal pastors create false hope for members for prosperity as a strategy for church growth. Rather than encourage congregates to acquire skills to enable them to offer services and products, they organize prayer programmes where they are asked to sow seed, which only enriches the pastors but depletes the poor. They know wealth cannot be created through prayers, yet, members are advised to exercise faith.

Unfortunately, donations, levies and other revenues contributed by members of the church are not fully used for kingdom expansion but diverted and invested in private family commercial businesses registered in family names.  Returns from these investments are also not fully ploughed into the church but partly reinvested into other businesses, including real estate, stocks, manufacturing, and even aviation where underutilized private jets are leased for commercial purposes.

Implicitly, there are now obvious blurred lines between spiritual and temporal dimensions fueled by material pursuits involving Pentecostal pastors and politicians. Existential gaps between them have continued to be narrowed by shared values, exacerbated by materialism. The underpinning motive behind this seeming convergence is prosperity, covertly wrapped under the guise of bringing succour to the people, which is currently posing a serious reputation threat to the Pentecostal movement, and reshaping it to conjure an image of hypocrisy.  It is indeed, an unhelpful development.

Sadly, the affluence associated with pastoral office is also currently having a ring on the minds of church members who are enrolled in Bible Colleges.  Most of them now look forward to establishing their church upon graduation. They also want to “blow” like their pastors who project their stupendous wealth as a product of divine favour, prompting them to want to set aside divine ordinances and protocols to commence their ministries, rather than wait to be called by the Lord.

Dr. Mike Owhoko, Lagos-based public policy analyst, author, and journalist can be reached at www.mikeowhoko.com and followed on X {formerly Twitter} @michaelowhoko.

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Feature/OPED

How Christians Can Stay Connected to Their Faith During This Lenten Period

Published

on

Lenten Period

It’s that time of year again, when Christians come together in fasting and prayer. Whether observing the traditional Lent or entering a focused period of reflection, it’s a chance to connect more deeply with God, and for many, this season even sets the tone for the year ahead.

Of course, staying focused isn’t always easy. Life has a way of throwing distractions your way, a nosy neighbour, a bus driver who refuses to give you your change, or that colleague testing your patience. Keeping your peace takes intention, and turning off the noise and staying on course requires an act of devotion.

Fasting is meant to create a quiet space in your life, but if that space isn’t filled with something meaningful, old habits can creep back in. Sustaining that focus requires reinforcement beyond physical gatherings, and one way to do so is to tune in to faith-based programming to remain spiritually aligned throughout the period and beyond.

On GOtv, Christian channels such as Dove TV channel 113, Faith TV and Trace Gospel provide sermons, worship experiences and teachings that echo what is being practised in churches across the country.

From intentional conversations on Faith TV on GOtv channel 110 to true worship on Trace Gospel on channel 47, these channels provide nurturing content rooted in biblical teaching, worship, and life application. Viewers are met with inspiring sermons, reflections on scripture, and worship sessions that help form a rhythm of devotion. During fasting periods, this kind of consistent spiritual input becomes a source of encouragement, helping believers stay anchored in prayer and mindful of God’s presence throughout their daily routines.

To catch all these channels and more, simply subscribe, upgrade, or reconnect by downloading the MyGOtv App or dialling *288#. You can also stream anytime with the GOtv Stream App.

Plus, with the We Got You offer, available until 28th February 2026, subscribers automatically upgrade to the next package at no extra cost, giving you access to more channels this season.

Continue Reading

Feature/OPED

Turning Stolen Hardware into a Data Dead-End

Published

on

Apu Pavithran Turning Stolen Hardware

By Apu Pavithran

In Johannesburg, the “city of gold,” the most valuable resource being mined isn’t underground; it’s in the pockets of your employees.

With an average of 189 cellphones reported stolen daily in South Africa, Gauteng province has become the hub of a growing enterprise risk landscape.

For IT leaders across the continent, a “lost phone” is rarely a matter of a misplaced device. It is frequently the result of a coordinated “snatch and grab,” where the hardware is incidental, and corporate data is the true objective.

Industry reports show that 68% of company-owned device breaches stem from lost or stolen hardware. In this context, treating mobile security as a “nice-to-have” insurance policy is no longer an option. It must function as an operational control designed for inevitability.

In the City of Gold, Data Is the Real Prize

When a fintech agent’s device vanishes, the $300 handset cost is a rounding error. The real exposure lies in what that device represents: authorised access to enterprise systems, financial tools, customer data, and internal networks.

Attackers typically pursue one of two outcomes: a quick wipe for resale on the secondary market or, far more dangerously, a deep dive into corporate apps to extract liquid assets or sellable data.

Clearly, many organisations operate under the dangerous assumption that default manufacturer security is sufficient. In reality, a PIN or fingerprint is a flimsy barrier if a device is misconfigured or snatched while unlocked. Once an attacker gets in, they aren’t just holding a phone; they are holding the keys to copy data, reset passwords, or even access admin tools.

The risk intensifies when identity-verification systems are tied directly to the compromised device. Multi-Factor Authentication (MFA), widely regarded as a gold standard, can become a vulnerability if the authentication factor and the primary access point reside on the same compromised device. In such cases, the attacker may not just have a phone; they now have a valid digital identity.

The exposure does not end at authentication. It expands with the structure of the modern workforce.

65% of African SMEs and startups now operate distributed teams. The Bring Your Own Device (BYOD) culture has left many IT departments blind to the health of their fleet, as personal devices may be outdated or jailbroken without any easy way to know.

Device theft is not new in Africa. High-profile incidents, including stolen government hardware, reinforce a simple truth: physical loss is inevitable. The real measure of resilience is whether that loss has any residual value. You may not stop the theft. But you can eliminate the reward.

Theft Is Inevitable, Exposure is Not

If theft cannot always be prevented, systems must be designed so that stolen devices yield nothing of consequence. This shift requires structured, automated controls designed to contain risk the moment loss occurs.

Develop an Incident Response Plan (IRP)
The moment a device is reported missing, predefined actions should trigger automatically: access revocation, session termination, credential reset and remote lock or wipe.

However, such technical playbooks are only as fast as the people who trigger them. Employees must be trained as the first line of defence —not just in the use of strong PINs and biometrics, but in the critical culture of immediate reporting. In high-risk environments, containment windows are measured in minutes, not hours.

Audit and Monitor the Fleet Regularly

Control begins with visibility. Without a continuous, comprehensive audit, IT teams are left responding to incidents after damage has occurred.

Opting for tools like Endpoint Detection and Response (EDR) allows IT teams to spot subtle, suspicious activities or unusual access attempts that signal a compromised device.

Review Device Security Policies
Security controls must be enforced at the management layer, not left to user discretion. Encryption, patch updates and screen-lock policies should be mandatory across corporate devices.

In BYOD environments, ownership-aware policies are essential. Corporate data must remain governed by enterprise controls regardless of device ownership.

Decouple Identity from the Device
Legacy SMS-based authentication models introduce avoidable risk when the authentication channel resides on the compromised handset. Stronger identity models, including hardware tokens, reduce this dependency.

At the same time, native anti-theft features introduced by Apple and Google, such as behavioural theft detection and enforced security delays, add valuable defensive layers. These controls should be embedded into enterprise baselines rather than treated as optional enhancements.

When Stolen Hardware Becomes Worthless

With POPIA penalties now reaching up to R10 million or a decade of imprisonment for serious data loss offences, the Information Regulator has made one thing clear: liability is strict, and the financial fallout is absolute. Yet, a PwC survey reveals a staggering gap: only 28% of South African organisations are prioritising proactive security over reactive firefighting.

At the same time, the continent is battling a massive cybersecurity skills shortage. Enterprises simply do not have the boots on the ground to manually patch every vulnerability or chase every “lost” terminal. In this climate, the only viable path is to automate the defence of your data.

Modern mobile device management (MDM) platforms provide this automation layer.

In field operations, “where” is the first indicator of “what.” If a tablet assigned to a Cape Town district suddenly pings on a highway heading out of the city, you don’t need a notification an hour later—you need an immediate response. An effective MDM system offers geofencing capabilities, automatically triggering a remote lock when devices breach predefined zones.

On Supervised iOS and Android Enterprise devices, enforced Factory Reset Protection (FRP) ensures that even after a forced wipe, the device cannot be reactivated without organisational credentials, eliminating resale value.

For BYOD environments, we cannot ignore the fear that corporate oversight equates to a digital invasion of personal lives. However, containerization through managed Work Profiles creates a secure boundary between corporate and personal data. This enables selective wipe capabilities, removing enterprise assets without intruding on personal privacy.

When integrated with identity providers, device posture and user identity can be evaluated together through multi-condition compliance rules. Access can then be granted, restricted, or revoked based on real-time risk signals.

Platforms built around unified endpoint management and identity integration enable this model of control. At Hexnode, this convergence of device governance and identity enforcement forms the foundation of a proactive security mandate. It transforms mobile fleets from distributed risk points into centrally controlled assets.

In high-risk environments, security cannot be passive. The goal is not recovery. It is irrelevant, ensuring that once a device leaves authorised hands, it holds no data, no identity leverage, and no operational value.

Apu Pavithran is the CEO and founder of Hexnode

Continue Reading

Feature/OPED

Daniel Koussou Highlights Self-Awareness as Key to Business Success

Published

on

Ambassador Daniel Kossouno

By Adedapo Adesanya

At a time when young entrepreneurs are reshaping global industries—including the traditionally capital-intensive oil and gas sector—Ambassador Daniel Koussou has emerged as a compelling example of how resilience, strategic foresight, and disciplined execution can transform modest beginnings into a thriving business conglomerate.

Koussou, who is the chairman of the Nigeria Chapter of the International Human Rights Observatory-Africa (IHRO-Africa), currently heads the Committee on Economic Diplomacy, Trade and Investment for the forum’s Nigeria chapter. He is one of the young entrepreneurs instilling a culture of nation-building and leadership dynamics that are key to the nation’s transformation in the new millennium.

The entrepreneurial landscape in Nigeria is rapidly evolving, with leaders like Koussou paving the way for innovation and growth, and changing the face of the global business climate. Being enthusiastic about entrepreneurship, Koussou notes that “the best thing that can happen to any entrepreneur is to start chasing their dreams as early as possible. One of the first things I realised in life is self-awareness. If you want to connect the dots, you must start early and know your purpose.”

Successful business people are passionate about their business and stubbornly driven to succeed. Koussou stresses the importance of persistence and resilience. He says he realised early that he had a ‘calling’ and pursued it with all his strength, “working long weekends and into the night, giving up all but necessary expenditures, and pressing on through severe setbacks.”

However, he clarifies that what accounted for an early success is not just tenacity but also the ability to adapt, to recognise and respond to rapidly changing markets and unexpected events.

Ambassador Koussou is the CEO of Dau-O GIK Oil and Gas Limited, an indigenous oil and natural gas company with a global outlook, delivering solutions that power industries, strengthen communities, and fuel progress. The firm’s operations span exploration, production, refining, and distribution.

Recognising the value of strategic alliances, Koussou partners with business like-minds, a move that significantly bolsters Dau-O GIK’s credibility and capacity in the oil industry. This partnership exemplifies the importance of building strong networks and collaborations.

The astute businessman, who was recently nominated by the African Union’s Agenda 2063 as AU Special Envoy on Oil and Gas (Continental), admonishes young entrepreneurs to be disciplined and firm in their decision-making, a quality he attributed to his success as a player in the oil and gas sector. By embracing opportunities, building strong partnerships, and maintaining a commitment to excellence, Koussou has not only achieved personal success but has also set a benchmark for future generations of African entrepreneurs.

His journey serves as a powerful reminder that with determination and vision, success is within reach.

Continue Reading

Trending