Connect with us

society

Group Calls for Independent Probe into Alleged Kwara Govt Arming of Bandits

Published

on

*Group Calls for Independent Probe into Alleged Kwara Govt Arming of Bandits*

 

The Crisis and Situation Monitoring Room (CSMR), a human rights advocacy organisation, has issued a strong demand for an immediate, independent investigation into serious allegations linking the Kwara State Government to the arming of criminal elements responsible for escalating banditry in the state.

 

The group’s intervention follows widespread public concern over claims that prohibited firearms and a government-branded security vehicle ended up in the hands of suspected bandits operating in Ifelodun Local Government Area and beyond.

 

In a statement, Dr. Anthony Rowland Attah, Executive Director of CSMR, sharply criticised Governor AbdulRahman Abdulrazaq’s administration for what he described as a dangerous pattern of insecurity and potential complicity that has eroded public trust.

 

“The allegations emerging from recent security operations are not mere rumours but point to a profound crisis of governance in Kwara State,” he said.

 

“If officials under Governor Abdulrazaq have facilitated the distribution of AK-47 rifles – weapons exclusively reserved for federal security forces – to non-state actors masquerading as patrol operatives, this constitutes a direct assault on national security and a blatant violation of the 1999 Constitution.

 

“Section 14(2)(b) unequivocally states that the security and welfare of the people shall be the primary purpose of government. Yet, under this administration, communities in Ifelodun, Edu, Patigi, and other areas have endured relentless attacks, kidnappings, and killings, with hundreds displaced and lives lost.

 

“Arming criminals, whether intentionally or through gross negligence, transforms the state from protector to perpetrator, amounting to nothing short of state-enabled terrorism.

 

“We reject any attempt to dismiss these claims as misinformation without transparent accountability. The presence of a local government security vehicle in the possession of armed suspects raises unavoidable questions about oversight, procurement, and distribution chains within the governor’s apparatus.

 

“No state governor possesses the constitutional authority to procure or distribute military-grade weapons like AK-47s, as confirmed repeatedly by legal precedents and federal regulations.

 

“To ensure an impartial process free from executive interference, we insist on a federal-led independent probe, ideally through a judicial commission of inquiry or special panel appointed by the President.

 

“This investigation must trace the provenance of the weapons, examine logistical support provided to alleged vigilante groups, and identify any officials involved, including those referenced in public accounts.

 

“Furthermore, in light of the gravity of these allegations and to prevent any tampering with evidence or witnesses, we call on President Bola Ahmed Tinubu to invoke necessary constitutional measures to suspend Governor AbdulRahman Abdulrazaq from office pending the conclusion of investigations.

 

“Such action would uphold due process, restore confidence in governance, and align with established precedents in cases of serious misconduct threatening public safety.”

 

Dr. Attah emphasised that CSMR’s demand stems from a commitment to constitutionalism and human rights, warning that failure to act decisively could embolden criminal networks and further destabilise the North-Central region.

 

The group noted ongoing insecurity trends in Kwara, including killings, reported abductions and attacks that have prompted school closures and community displacements, arguing that the current administration has failed in its fundamental duty to safeguard citizens.

 

While the Kwara State Government has issued denials, asserting no arrests occurred within its borders and no authority to distribute prohibited arms, CSMR maintained that such responses fall short without verifiable independent scrutiny.

society

SPECIAL PROMOTION OF PRESIDENT’S ADC SPARKS CONTROVERSY: QUESTIONS RAISED OVER MERIT, PROCESS, AND MILITARY INTEGRITY

Published

on

Stop the Propaganda and Lies: ADC Dares Tinubu to Confront the Suffering on Nigeria’s Streets. By George Omagbemi Sylvester Published by SaharaWeeklyNG.com

SPECIAL PROMOTION OF PRESIDENT’S ADC SPARKS CONTROVERSY: QUESTIONS RAISED OVER MERIT, PROCESS, AND MILITARY INTEGRITY

The recent promotion of the President’s Aide-de-Camp (ADC) to the rank of Brigadier General has sparked intense debate within military and political circles, raising concerns about institutional integrity, meritocracy, and adherence to established Nigerian Army protocols.
Military analysts warn that bypassing formal promotion boards and statutory vetting mechanisms undermines both morale and professionalism, potentially jeopardizing national security. The ADC’s role is traditionally capped at the rank of Colonel, and the elevation to Brigadier General represents a marked deviation from long-standing norms.
Concerns Raised
Experts cite multiple issues with the promotion:
Violation of Due Process: Established promotion procedures and Army Council oversight were reportedly bypassed.
Erosion of Meritocracy: The move appears to prioritize political proximity over battlefield experience, command record, and academic qualifications.
Demoralization of Senior Officers: Colonels awaiting promotion based on service and performance may feel sidelined.
Undermining Command Authority: The promotion could weaken the Chief of Army Staff’s ability to enforce standards.
Operational Risk: Assigning a general officer rank to an officer without strategic training may compromise mission effectiveness.
International Embarrassment: Such actions risk diminishing the Nigerian military’s reputation among peer armed forces.
Observers also note potential symbolic damage, conflict-of-interest concerns, and the risk of fostering sycophancy over professional excellence.
Calls for Corrective Action
In response, experts and military stakeholders have proposed several measures:
1. Immediate Review by the Army Council: The promotion should be formally examined in line with existing regulations.
2. Voluntary Reversion Pending Compliance: The ADC could revert to Colonel to complete mandatory courses before a merit-based promotion.
3. Reaffirmation of Military Procedures: Public statements by the President and Army Headquarters could reinforce adherence to statutory promotion processes.
4. Legislative Oversight: The National Assembly’s Defence Committees should ensure transparency and statutory compliance.
5. Binding Policy on General Officer Promotion: Officers should attain general rank only after completing required senior defence courses.
Military analysts emphasize that strong institutions outlive strong individuals. Ensuring adherence to promotion rules and merit-based advancement is crucial to maintaining confidence in the Nigerian Army, protecting morale, and safeguarding the country’s strategic interests.
Continue Reading

society

Cyber-Armageddon at Our Fingertips: Apple & Google Rush Emergency Updates to Thwart Sophisticated Zero-Day Hacking Campaign

Published

on

Cyber-Armageddon at Our Fingertips: Apple & Google Rush Emergency Updates to Thwart Sophisticated Zero-Day Hacking Campaign.

By George Omagbemi Sylvester | Published by SaharaWeeklyNG.com

 

“A Chilling Exposé of Unprecedented Cyber Threats, State-Linked Exploitation and the Battle for Digital Sovereignty.”

In a dramatic and sobering turn of events this December 2025, two of the world’s most revered technology giants (Apple and Google) have been forced to issue emergency cybersecurity updates in response to a sophisticated, actively exploited hacking campaign that has shaken the global digital ecosystem to its core. This episode not only reveals the raw power of advanced cyber adversaries but also lays bare the fragility of modern digital life, reminding every connected individual that no device is truly immune without vigilant defense.

At the heart of this crisis are zero-day vulnerabilities and security flaws unknown to software makers at the time of exploitation, leaving users defenseless until a fix arrives. These zero-day bugs are among the most dangerous security threats in existence precisely because they offer no warning; they represent blind spots in our digital armor that sophisticated attackers can and do exploit without limitation.

The Crisis Unfolds: Emergency Response from Silicon Valley. In mid-December 2025, Google released urgent patches for a series of critical security flaws in its Chrome browser—one of which was already being exploited in the wild by malicious actors before the patch could even be completed. The company’s initial decision to withhold details underscores the seriousness of the incident, a rare move reflecting an ongoing investigation into exploit activity.

Shortly thereafter, Google clarified that the vulnerability was discovered by Apple’s Security Engineering team working in collaboration with Google’s Threat Analysis Group (TAG)—a specialized unit renowned for tracking government-linked threat actors and mercenary spyware sellers. This collaboration alone signals the gravity of the threat, suggesting state-level resources or highly resourced private actors were involved.

Almost simultaneously, Apple unleashed a sweeping suite of emergency updates for devices across its ecosystem—iPhones, iPads, Macs, Apple Watches, Apple TV, Vision Pro headsets and Safari browsers. In formal advisories, Apple acknowledged that two zero-day vulnerabilities “may have been exploited in an extremely sophisticated attack against specific targeted individuals” on devices running older versions of iOS prior to iOS 26. This is the same phrasing Apple historically has used to signal confirmed real-world exploitation, often in espionage campaigns.

Understanding Zero-Day Vulnerabilities: The Invisible Threat. To grasp the magnitude of this crisis, one must understand what zero-day vulnerabilities represent in cybersecurity. A zero-day flaw is a software defect unknown to developers at the time hackers discover and exploit it, leaving developers with “zero days” to prepare a defense before exploitation begins. This creates a perfect storm for attackers: no signature exists in security tools, no patch is available, and unsuspecting users carry on with business as usual.

Security expert Bruce Schneier (renowned cryptographer and cybersecurity authority) has described zero-days as “the crown jewels of cyberattackers”, because they can be weaponized to bypass traditional cyber defenses, compromise sensitive data, and infiltrate personal and institutional devices without detection. His words resonate profoundly in the context of the present crisis.

The Engine Behind the Attacks: WebKit and Memory Corruption Flaws.
In Apple’s case, the two patched vulnerabilities (CVE-2025-43529 and CVE-2025-14174) both reside in WebKit, the web rendering engine that drives not just Safari but all iOS web content across apps. These flaws include a use-after-free condition and a memory corruption issue, both classic exploits that allow attackers to execute arbitrary code simply by tricking a device into processing malicious web content.

What makes these bugs particularly dangerous is that WebKit is central to web content across platforms, meaning that merely visiting a malicious website could be enough to trigger an exploit—without any explicit user action. This bears eerie resemblance to historical spyware campaigns such as Pegasus, a notorious Israeli-made spyware capable of remote infection via zero-click exploits and extensive privacy invasion.

Coordinated Industry Action: Google and Apple Unite. The fact that Google’s Threat Analysis Group and Apple’s security team independently discovered and jointly addressed these flaws is notable. TAG is known for its focus on sophisticated attackers, including state actors and commercial spyware firms. Its involvement strongly suggests the hacking campaign was no ordinary cybercrime operation, but part of a highly targeted exploitation effort.

One of the bugs patched in Google Chrome (tracked internally as bug 466192044) was believed to allow memory corruption and arbitrary code execution. Google advised users to update to the latest safe release immediately to mitigate these risks.

Who Was Targeted? The Fog of Attribution. Neither Apple nor Google disclosed the identities or numbers of affected users. This ambiguity is typical in zero-day remediation: until patches are deployed, revealing too much can empower attackers to adjust tactics and expand operations. However, the explicit language used by Apple (that the vulnerabilities may have been exploited against specific targeted individuals) strongly implies high-value targets were in the crosshairs.

Past incidents reinforce this narrative. In previous years, zero-day exploits have been linked to espionage campaigns targeting journalists, diplomats, political activists, and human rights defenders—often leveraging spyware tools marketed by commercial vendors but deployed with the backing or tacit approval of nation-state actors.

The Broader Implications: A World Under Digital Siege
This combined emergency response from Apple and Google serves as a stark reminder: our digital infrastructures remain vulnerable to determined adversaries. The increasing sophistication of these attacks underscores a broader global trend—cyber threat actors, whether state-sponsored or commercial, are continually refining their tools, exploiting undisclosed defects, and penetrating even the most “secure” platforms.

Cybersecurity researcher Bruce Schneier has observed that “security is a process, not a product,” emphasizing that no system is ever perfectly secure. This holds true even for systems held up as gold standards in security engineering. The present crisis confirms that vigilance, rapid response, and constant iteration of defenses are essential in a world where attackers innovate faster than we often realize.

What Individuals and Institutions Must Do Now
The immediate lesson from this cybersecurity drama is clear: update all affected devices without delay. Emergency patches, while disruptive, represent the frontline defense against exploitation. Users should ensure their Apple devices are updated to iOS 26.2 (or the latest versions for Macs, Watches, and Vision Pro), and all Chrome installations are updated to the versions containing the latest security fixes.

Beyond patching, cybersecurity professionals stress the importance of multi-layered defenses, including:

Regular software updates

Endpoint protection and threat detection tools

User education on social engineering and phishing avoidance

Network segmentation in enterprise environments

Cyber-Armageddon at Our Fingertips: Apple & Google Rush Emergency Updates to Thwart Sophisticated Zero-Day Hacking Campaign.
By George Omagbemi Sylvester | Published by SaharaWeeklyNG.com

Closing Reflection: A Call to Digital Arms
The recent emergency updates from Apple and Google are more than just technical bulletins; they are a clarion call to the global community about the evolving nature of cyber threats. In an age where smartphones and broadband are extensions of our very identities, these vulnerabilities strike at the heart of personal and organizational security.

Cyber threats will continue to evolve as long as we innovate, but so too must our defenses. The strategy must be relentless preparation, robust response, and continuous improvement—transforming each crisis into a catalyst for stronger, more resilient digital ecosystems.

As the world watches and patches roll out, one lesson stands above all: cybersecurity is not merely an IT issue, it is a societal imperative.

 

Cyber-Armageddon at Our Fingertips: Apple & Google Rush Emergency Updates to Thwart Sophisticated Zero-Day Hacking Campaign.
By George Omagbemi Sylvester | Published by SaharaWeeklyNG.com

Continue Reading

society

Fresh Twist in Pastor Chris Okafor–Doris Ogala Saga as Insiders Dismiss Allegations as Fabricated

Published

on

Fresh Twist in Pastor Chris Okafor–Doris Ogala Saga as Insiders Dismiss Allegations as Fabricated

By: Al Humphrey Onyanabo 

There appears to be a dramatic twist in the ongoing controversy involving popular cleric Pastor Chris Okafor and Nollywood actress Doris Ogala, as fresh claims from insiders now cast serious doubt on the allegations that recently set social media ablaze.

 

Sources familiar with internal developments within the pastor’s circle insist that the accusations levelled against Pastor Okafor are entirely false, describing them as a coordinated smear campaign allegedly sponsored by a former pastor who was once close to him. According to the insider, the said former associate is accused of having had an affair with Doris Ogala as well as another prominent female member of the church.

 

The source further claims that the dramatic allegations, including purported evidence circulating online, are forged and form part of what was described as a desperate attempt to tarnish the image of Pastor Okafor and discredit his ministry.

 

> “How does someone suddenly wake up months after he has done his marriage introduction to start making these claims?” the insider questioned. “Where has she been all this while?”

 

 

Adding another layer to the unfolding drama, the source revealed that a formal petition has reportedly been written, and that Doris Ogala alongside other alleged collaborators may soon be invited for questioning by relevant authorities as investigations progress.

 

While none of these counter-claims have yet been officially confirmed by law enforcement agencies, they have significantly shifted public attention, raising questions about the timing, motive, and authenticity of the allegations that triggered widespread outrage online.

 

If the claims of a fabricated relationship and manipulated evidence are eventually proven true, the saga would stand as a troubling example of how social media can be weaponised to destroy reputations, especially in an era where accusations often spread faster than facts.

 

The unfolding situation underscores the growing dangers of trial by social media, where unverified claims can inflict lasting damage before investigations are concluded. Observers warn that the case serves as a cautionary tale for the public to exercise restraint and critical judgment when consuming and sharing sensitive information online.

 

As the controversy continues to evolve, all eyes remain on the parties involved, with many calling for a thorough and transparent investigation to separate truth from manipulation and ensure justice for all concerned.

 

 

By: Al Humphrey Onyanabo,

The Storyteller,

Email: [email protected]

Continue Reading

Cover Of The Week

Trending