Advertisement
Advertisement

Why ISWAP likely didn’t intercept Brigadier General Uba’s WhatsApp communication

BY SUNDAY OGUNLANA

The tragic killing of Nigerian Army Brigadier General U. M. Uba during an ambush by ISWAP has shocked the nation and intensified public discussion. Among the narratives circulating online is the claim that ISWAP intercepted the General’s WhatsApp communication and location while he awaited rescue. Although emotionally compelling, this claim lacks technical credibility and does not align with the known capabilities of ISWAP.

WhatsApp uses end-to-end encryption designed so that only the sender and the intended recipient can read the communication. Even WhatsApp itself cannot access the content of messages. To intercept such communication, an adversary would need to compromise the device at a fundamental level using sophisticated spyware. Only a handful of nation-state actors possess such tools. Pegasus, the advanced surveillance malware previously deployed by some governments, is one such example. There is no evidence that ISWAP, a non-state armed group, has ever acquired or operated surveillance capabilities remotely close to Pegasus.

This reality leads to a more plausible explanation: insider threat. Operational compromise from within has long plagued counterinsurgency operations in the Lake Chad Basin. Terrorist groups rely heavily on human intelligence networks, local collaborators, informants, and compromised individuals to track troop movement and anticipate military deployments. These human-driven vulnerabilities often yield more reliable results for insurgents than any attempt at decrypting modern communication platforms.

Advertisement

Public debate has also shifted toward blaming journalists and bloggers for publishing early reports about the ambush. This criticism is misplaced. The Nigerian military does not rely on social media chatter to inform rescue operations. Military decisions are driven by verified intelligence, reconnaissance, surveillance assets, and secure command channels. Attempting to blame the media distracts from deeper operational gaps and undermines the essential function of the press in a democratic society.

Open source intelligence, including media reporting, plays an indispensable role in modern national security. Globally, law enforcement and intelligence agencies use OSINT to monitor threats, understand extremist narratives, and support investigative processes. The value lies not in the collection itself but in how professionals analyse and contextualise the information. A responsible media landscape enhances national resilience by reducing the space for misinformation and denying terrorist groups the ability to control the narrative.

Transparency is a critical pillar of any effective counterterrorism strategy. When government institutions restrict information or communicate inconsistently, terrorists seize the opportunity to shape public perception with propaganda. A well-informed public is harder to manipulate. Open communication builds trust, boosts morale, and reinforces collective resolve against violent extremism.

Advertisement

The death of Brigadier General Uba is a painful reminder of the sacrifices borne by our military. It also highlights the urgent need to strengthen insider threat programs, improve operational communication security, and enforce accountability mechanisms across the security architecture. Focusing on the facts rather than sensational narratives ensures that the lessons learned from this tragedy lead to meaningful reform.

Nigeria’s war against terrorism will not be won solely on the battlefield. It requires an integrated approach that combines intelligence, community engagement, transparent communication, and digital literacy. ISWAP’s propaganda attempts should not overshadow the technical realities or the broader systemic issues that demand sustained attention.

Sunday Ogunlana, PhD, is a cybersecurity professor and principal consultant, Ogun Security Research and Strategic Consulting LLC

Advertisement


Views expressed by contributors are strictly personal and not of TheCable.

error: Content is protected from copying.