Feature/OPED
Rumour Mill, Quackery, Lies and Fake News: The Story of Sahara Reporters
By Bilyaminu Kong-kol
The objective of communication is, indisputably, to attain the desired result; definitely for it to serve the purpose for which it is designed, intended or planned, positive or negative.
Communication has been perhaps the most important aspect of human and social existence even during the primitive age.
Therefore, care must be taken to preserve its sanctity and values and that demands that the content being pushed out is not distorted or cooked, espousing the public good and sometimes truthfully exposing wrongdoings in the society.
A medium which hurts, destroys people and elicits growling phone calls and libel suits has little chance of survival.
Ethically, objectivity, fairness, sticking to the facts, weighing facts against truths and demanding the other side are hallmarks of good reportage. One of the dictums is that as reporters you should not LIE; it should not be the figment of the imagination of the organisation.
The Sahara Reporters team has crafted a different set of canons for its recruits; their speciality, to say the least, is taking the frontier of reporting away from facts to the inglorious realm of groundless speculation and dementia.
It is an absurdly false and characterless brand of gutter and blackmail journalism; a pack of chatterboxes and clamps whose stock in trade is falsehoods, obnoxious and villainous ‘beer parlour’ gossips.
By constantly waging wars against those in authority and vilipending them, the online medium is gradually tightening the noose around its neck as purveyor of fake news and propaganda.
At best, Sahara Reporters’ variant of journalism is no-par-value as against evidence-based, factual, authenticated and verified reports of a credible medium.
The nontradable products of the medium are fertile grounds for a classical study of an abuse of the new media and its irresistibility by gullible few who are wont to be rather quick in swallowing their churn-outs hook, line and sinker and disregarding rebuttal or apologies by such errant media.
Unlike a renowned restaurateur with wide ranging traditional clientele who are pernickety, the likes of Sahara Reporters are piffling, pig-headed and higgledy-piggledy.
The dysfunctional aspect of their reportage is fast becoming a phenomenon contrived mainly to destroy, damage reputation and integrity built over the years all in a bid to get rich quick extortionately.
In the absence of any regulation or regulatory body or union, the only option is to approach the court to checkmate this errancy and miscreants in journalists’ toga whose watchword is publishing dishonesty, malicious, repulsive, contemptible and loathsome reports.
They continue to relish in it because the wheel of justice for libel and defamation cases is supposedly slow as most cases are not expeditiously tried – taking several years to serve justice. The question is: how many people who have consumed the fake news ab initio will ever get to read the judgment obtained against such errant medium or media? Even apologies are taken with a pinch of salt!
Since most media are near shutdown or distressed with zero-assets, damages to the tune of millions can’t be settled by them while they resort to out-of-court settlement and getting monarchs and personages to intervene, typical of the miscreants they are. Sahara Reporters as a medium is in and out of court with fusillade of lawsuits and it may just be adding to the long list inadvertently.
The Speaker of the Lagos State House of Assembly, Mudashiru Obasa; ex-Lagos State Governor, Akinwunmi Ambode; Ogun State Government; the Central Bank Governor, Godwin Emefiele; even Nigeria’s presidency have had to refute their stories time and again with some of them ending up in litigation.
Sadly, there is character or profession in Sahara Reporters that can act as institutional gatekeeper to checkmate these inanely, insubstantial and irritatingly silly bush telegraphs, and spreading gossips swiftly without restraint. It would have been better for the medium to go back to the medieval and primitive method of communication by words of mouth or gongs or drumbeats that can be denied or disowned.
A litany of some of the fake news published by Sahara Reporters include In March 2020 – Sahara Reporters published a report that the Government IT clearinghouse, the National Information Technology Development Agency (NITDA) received N1 billion from the Nigerian Communications Commission (NCC) on the orders of the Minister of Communications and Digital Economy, Dr Isa Ali Ibrahim Pantami.
According to Sahara Reporters, it was intended for a “digital learning scheme”.
NITDA has maintained it is not promoting and has never promoted any programme with the title “Digital Learning Scheme” and has, therefore, never received any sum from the NCC for this phantom project or any other project.
NITDA in strong terms publicly and unequivocally denied the false report and has challenged Sahara Reporters to publish proof. Till date, the media house is yet to respond.
In 2018, Sahara Reporters in a report said that a former Minister of Aviation, Femi Fani-Kayode’s two-year-old union with wife Precious Chikwendu had allegedly “hit the rocks and threatening to explode in dramatic fashion”.
“We wish to put it on record that there is absolutely no an iota of truth in any part of that story and it is nothing but fake news,” the Minister said in a statement.
“As a matter of fact, it is a total fabrication put together by a desperate and vicious media house that seeks to destroy the lives of every member of the Fani-Kayode family,” he had further said.
The wife, Precious Chikwendu, also came out to accuse Sahara Reporters of publishing falsehood and asked the media house to apologise.
The couple is still together and both had triplets last year. Again, Sahara Reporters is yet to apologise for publishing fake news.
Also, in a report fraught with lies and embarrassment, the online medium alleged that the Attorney-General of the Federation and Minister of Justice, Abubakar Malami, purchased a multi-million Naira Abuja mansion for his son who recently got married.
Malami described the report as ‘fabricated allegations’ that had become the trade of his traducers. The report also alleged that the Attorney-General was planning “a second leg” of the wedding for his son and had allegedly chartered private jets to convey guests to the purported venue. The Minister had responded, saying the son does not even reside in Abuja.
“It is one of such libellous publications of which the newspaper is commonly known for, the AGF said. It targets a selected few for unsubstantiated fabricated allegations while overlooking more serious reasonable allegations visibly against its favoured sectional kinsmen.”
The AGF challenged anyone with evidence on his alleged purchase of the said mansion and charter of private jets to make such public.
“Who is the vendor of the purported house bought for my son in Abuja at N300m? Where is it located? Where are the title documents?” he queried.
On the alleged chartered jets: “It is common knowledge that I have neither a father nor mother anywhere in Nigeria to convey to Kano for the wedding.”
“Who then am I using the chartered flight to convey? Which jets are chartered? Who paid for the charter? Through which means was the money paid?” he further queried. Till date, Sahara is yet to publish any evidence to support the story.
Sahara Reporters is on a mission, engaging in needless and self-destructive controversies to tarnish the image of public officers and citizens who are resolute in executing an agenda without kowtowing to powerful vested interest groups who resort to mudslinging when their demands are not met.
Quackery appears to be the vision, mission and centre stage of Sahara Reporters publishing devoid of decorum.
In this time and age, no sound professional journalist worth his salt should sit down after quaffing some beer to do a story unmindful that there are consequences.
Typing out squiggles from the reporter’s notebook, if not from the head, on the computer represents lives and the reporter and the organization should be conscious of what they do those lives.
Kong-kol is of the Department of Mass Communication, Bayero University, Kano. He can be reached via: bi********************@***il.com
Feature/OPED
How Christians Can Stay Connected to Their Faith During This Lenten Period
It’s that time of year again, when Christians come together in fasting and prayer. Whether observing the traditional Lent or entering a focused period of reflection, it’s a chance to connect more deeply with God, and for many, this season even sets the tone for the year ahead.
Of course, staying focused isn’t always easy. Life has a way of throwing distractions your way, a nosy neighbour, a bus driver who refuses to give you your change, or that colleague testing your patience. Keeping your peace takes intention, and turning off the noise and staying on course requires an act of devotion.
Fasting is meant to create a quiet space in your life, but if that space isn’t filled with something meaningful, old habits can creep back in. Sustaining that focus requires reinforcement beyond physical gatherings, and one way to do so is to tune in to faith-based programming to remain spiritually aligned throughout the period and beyond.
On GOtv, Christian channels such as Dove TV channel 113, Faith TV and Trace Gospel provide sermons, worship experiences and teachings that echo what is being practised in churches across the country.
From intentional conversations on Faith TV on GOtv channel 110 to true worship on Trace Gospel on channel 47, these channels provide nurturing content rooted in biblical teaching, worship, and life application. Viewers are met with inspiring sermons, reflections on scripture, and worship sessions that help form a rhythm of devotion. During fasting periods, this kind of consistent spiritual input becomes a source of encouragement, helping believers stay anchored in prayer and mindful of God’s presence throughout their daily routines.
To catch all these channels and more, simply subscribe, upgrade, or reconnect by downloading the MyGOtv App or dialling *288#. You can also stream anytime with the GOtv Stream App.
Plus, with the We Got You offer, available until 28th February 2026, subscribers automatically upgrade to the next package at no extra cost, giving you access to more channels this season.
Feature/OPED
Turning Stolen Hardware into a Data Dead-End
By Apu Pavithran
In Johannesburg, the “city of gold,” the most valuable resource being mined isn’t underground; it’s in the pockets of your employees.
With an average of 189 cellphones reported stolen daily in South Africa, Gauteng province has become the hub of a growing enterprise risk landscape.
For IT leaders across the continent, a “lost phone” is rarely a matter of a misplaced device. It is frequently the result of a coordinated “snatch and grab,” where the hardware is incidental, and corporate data is the true objective.
Industry reports show that 68% of company-owned device breaches stem from lost or stolen hardware. In this context, treating mobile security as a “nice-to-have” insurance policy is no longer an option. It must function as an operational control designed for inevitability.
In the City of Gold, Data Is the Real Prize
When a fintech agent’s device vanishes, the $300 handset cost is a rounding error. The real exposure lies in what that device represents: authorised access to enterprise systems, financial tools, customer data, and internal networks.
Attackers typically pursue one of two outcomes: a quick wipe for resale on the secondary market or, far more dangerously, a deep dive into corporate apps to extract liquid assets or sellable data.
Clearly, many organisations operate under the dangerous assumption that default manufacturer security is sufficient. In reality, a PIN or fingerprint is a flimsy barrier if a device is misconfigured or snatched while unlocked. Once an attacker gets in, they aren’t just holding a phone; they are holding the keys to copy data, reset passwords, or even access admin tools.
The risk intensifies when identity-verification systems are tied directly to the compromised device. Multi-Factor Authentication (MFA), widely regarded as a gold standard, can become a vulnerability if the authentication factor and the primary access point reside on the same compromised device. In such cases, the attacker may not just have a phone; they now have a valid digital identity.
The exposure does not end at authentication. It expands with the structure of the modern workforce.
65% of African SMEs and startups now operate distributed teams. The Bring Your Own Device (BYOD) culture has left many IT departments blind to the health of their fleet, as personal devices may be outdated or jailbroken without any easy way to know.
Device theft is not new in Africa. High-profile incidents, including stolen government hardware, reinforce a simple truth: physical loss is inevitable. The real measure of resilience is whether that loss has any residual value. You may not stop the theft. But you can eliminate the reward.
Theft Is Inevitable, Exposure is Not
If theft cannot always be prevented, systems must be designed so that stolen devices yield nothing of consequence. This shift requires structured, automated controls designed to contain risk the moment loss occurs.
Develop an Incident Response Plan (IRP)
The moment a device is reported missing, predefined actions should trigger automatically: access revocation, session termination, credential reset and remote lock or wipe.
However, such technical playbooks are only as fast as the people who trigger them. Employees must be trained as the first line of defence —not just in the use of strong PINs and biometrics, but in the critical culture of immediate reporting. In high-risk environments, containment windows are measured in minutes, not hours.
Audit and Monitor the Fleet Regularly
Control begins with visibility. Without a continuous, comprehensive audit, IT teams are left responding to incidents after damage has occurred.
Opting for tools like Endpoint Detection and Response (EDR) allows IT teams to spot subtle, suspicious activities or unusual access attempts that signal a compromised device.
Review Device Security Policies
Security controls must be enforced at the management layer, not left to user discretion. Encryption, patch updates and screen-lock policies should be mandatory across corporate devices.
In BYOD environments, ownership-aware policies are essential. Corporate data must remain governed by enterprise controls regardless of device ownership.
Decouple Identity from the Device
Legacy SMS-based authentication models introduce avoidable risk when the authentication channel resides on the compromised handset. Stronger identity models, including hardware tokens, reduce this dependency.
At the same time, native anti-theft features introduced by Apple and Google, such as behavioural theft detection and enforced security delays, add valuable defensive layers. These controls should be embedded into enterprise baselines rather than treated as optional enhancements.
When Stolen Hardware Becomes Worthless
With POPIA penalties now reaching up to R10 million or a decade of imprisonment for serious data loss offences, the Information Regulator has made one thing clear: liability is strict, and the financial fallout is absolute. Yet, a PwC survey reveals a staggering gap: only 28% of South African organisations are prioritising proactive security over reactive firefighting.
At the same time, the continent is battling a massive cybersecurity skills shortage. Enterprises simply do not have the boots on the ground to manually patch every vulnerability or chase every “lost” terminal. In this climate, the only viable path is to automate the defence of your data.
Modern mobile device management (MDM) platforms provide this automation layer.
In field operations, “where” is the first indicator of “what.” If a tablet assigned to a Cape Town district suddenly pings on a highway heading out of the city, you don’t need a notification an hour later—you need an immediate response. An effective MDM system offers geofencing capabilities, automatically triggering a remote lock when devices breach predefined zones.
On Supervised iOS and Android Enterprise devices, enforced Factory Reset Protection (FRP) ensures that even after a forced wipe, the device cannot be reactivated without organisational credentials, eliminating resale value.
For BYOD environments, we cannot ignore the fear that corporate oversight equates to a digital invasion of personal lives. However, containerization through managed Work Profiles creates a secure boundary between corporate and personal data. This enables selective wipe capabilities, removing enterprise assets without intruding on personal privacy.
When integrated with identity providers, device posture and user identity can be evaluated together through multi-condition compliance rules. Access can then be granted, restricted, or revoked based on real-time risk signals.
Platforms built around unified endpoint management and identity integration enable this model of control. At Hexnode, this convergence of device governance and identity enforcement forms the foundation of a proactive security mandate. It transforms mobile fleets from distributed risk points into centrally controlled assets.
In high-risk environments, security cannot be passive. The goal is not recovery. It is irrelevant, ensuring that once a device leaves authorised hands, it holds no data, no identity leverage, and no operational value.
Apu Pavithran is the CEO and founder of Hexnode
Feature/OPED
Daniel Koussou Highlights Self-Awareness as Key to Business Success
By Adedapo Adesanya
At a time when young entrepreneurs are reshaping global industries—including the traditionally capital-intensive oil and gas sector—Ambassador Daniel Koussou has emerged as a compelling example of how resilience, strategic foresight, and disciplined execution can transform modest beginnings into a thriving business conglomerate.
Koussou, who is the chairman of the Nigeria Chapter of the International Human Rights Observatory-Africa (IHRO-Africa), currently heads the Committee on Economic Diplomacy, Trade and Investment for the forum’s Nigeria chapter. He is one of the young entrepreneurs instilling a culture of nation-building and leadership dynamics that are key to the nation’s transformation in the new millennium.
The entrepreneurial landscape in Nigeria is rapidly evolving, with leaders like Koussou paving the way for innovation and growth, and changing the face of the global business climate. Being enthusiastic about entrepreneurship, Koussou notes that “the best thing that can happen to any entrepreneur is to start chasing their dreams as early as possible. One of the first things I realised in life is self-awareness. If you want to connect the dots, you must start early and know your purpose.”
Successful business people are passionate about their business and stubbornly driven to succeed. Koussou stresses the importance of persistence and resilience. He says he realised early that he had a ‘calling’ and pursued it with all his strength, “working long weekends and into the night, giving up all but necessary expenditures, and pressing on through severe setbacks.”
However, he clarifies that what accounted for an early success is not just tenacity but also the ability to adapt, to recognise and respond to rapidly changing markets and unexpected events.
Ambassador Koussou is the CEO of Dau-O GIK Oil and Gas Limited, an indigenous oil and natural gas company with a global outlook, delivering solutions that power industries, strengthen communities, and fuel progress. The firm’s operations span exploration, production, refining, and distribution.
Recognising the value of strategic alliances, Koussou partners with business like-minds, a move that significantly bolsters Dau-O GIK’s credibility and capacity in the oil industry. This partnership exemplifies the importance of building strong networks and collaborations.
The astute businessman, who was recently nominated by the African Union’s Agenda 2063 as AU Special Envoy on Oil and Gas (Continental), admonishes young entrepreneurs to be disciplined and firm in their decision-making, a quality he attributed to his success as a player in the oil and gas sector. By embracing opportunities, building strong partnerships, and maintaining a commitment to excellence, Koussou has not only achieved personal success but has also set a benchmark for future generations of African entrepreneurs.
His journey serves as a powerful reminder that with determination and vision, success is within reach.
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism10 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking8 years agoSort Codes of GTBank Branches in Nigeria
-
Economy3 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn











