The Oracle
The Oracle: The ECOWAS Transhumance Protocol and Need for Urgent Review (Pt.1)
Published
10 months agoon
By
Eric
By Prof Mike Ozekhome SAN
INTRODUCTION
The Economic Community of West African States (ECOWAS) Protocol on Transhumance adopted in 1998, was designed to facilitate the free movement of pastoralists and their livestock across West Africa (ECOWAS Transhumance Protocol (1998) (Decision A/DEC.5/10/98)). However, given Nigeria’s escalating insecurity—particularly farmer-herder conflicts, banditry and terrorism, the Protocol’s continued relevance and effectiveness have come under close scrutiny. The present intervention carefully examines the implications of the Protocol, making a case for its review, while analyzing the historical and contemporary challenges of pastoralism in West Africa, with specific focus on Nigeria.
TRANSHUMANCE: HISTORICAL BACKGROUND AND CONTEMPORARY CHALLENGES
Transhumance, particularly among the Fulanis, has existed for centuries, with seasonal migration between the Sahel and savannah regions. It is their socio-professional venture designed to maintain the productivity of livestock. This practice, which they have found effective in maintaining the productivity of livestock, is highly lucrative. In a paper published in 2019 by the International Organization for Migration titled, “Regional Policies and Response to Manage Pastoral Movements within the ECOWAS Region”, it was noted that Sahelian
“Transhumant pastoralism supplies an estimated 65 per cent of beef, 40 per cent of mutton and goat meat, and 70 per cent of milk in this region. In Mauritania, livestock breeding contributes to 70 per cent of the total agricultural GDP. In Niger, livestock is the second most important export product behind uranium. In Mali, Burkina Faso and the Niger, the livestock sector contributes to more than 25 per cent of the total GDP”.
What started positively later became sour with the advent of colonialism. Colonial policies disrupted traditional grazing routes, creating tensions that persist till date. Post-independence governments neglected pastoralist welfare, leading to marginalization and conflicts.
Several sources however indicate a growing call for a review of the ECOWAS Protocol, specifically concerning the deadly movement of herders. These calls are often linked to reports that some herders have since formed armed gangs, engaging in cattle rustling, kidnappings and banditry. Some Fulani militias have been serially implicated in communal violence, thereby complicating conflict resolution.
It is pertinent to note that pastoralists are mostly itinerant illiterates who rely on knowledge passed down to them by their fathers or family members from one generation to another. Due to their lack of Western education, most pastoralists often experience political marginalization and social stigmatization. In environments where natural and public resources are reserved to “indigenous” populations, they remain strangers and “non-citizens” who are excluded from basic rights. In the coastal States, there is considerable hostility towards mobile herders and their animals due to their predatory nature. In public discourse, they are also associated with armed groups and violence, leading to the stigmatization of an entire socio-professional group (International Organization for Migration, “Regional Policies and Response to Manage Pastoral Movements within the ECOWAS Region”).
THE ECOWAS PROTOCOL
With a view to addressing the challenges highlighted in the preceding paragraph, the Economic Community of West African States (ECOWAS), in 1998, came up with a protocol. Article 3 of the protocol provides for the right to free passage of all animals across the borders of all Member States. Also, the protocol introduced what is termed “ECOWAS International Transhumance Certificate” for each herd, providing information on the composition of the herd, the vaccinations given, the itinerary of the herds, the border posts to be crossed, and the final destination. This certificate is issued by the livestock department and initiated by the local administrative authorities in the country of origin. The International Transhumance Certificate enables authorities to monitor the herds before they leave the country of origin, to protect the health of local herds, and to make it possible to inform the host communities of the arrival of transhumant animals. This certificate, upon presentation, shall be verified and counter-signed by the competent authorities at the entry and exit points in the host country under Article 6. Also, under the protocol, the herders must follow the routes defined by Member States in accordance with the itinerary indicated on the ECOWAS International Transhumance Certificate. The herders must also enter and leave each country at official border crossings, and may not pass the border at night.
The establishment of the Economic Community of West African States (ECOWAS) in 1975 marked a significant step towards regional integration in West Africa. It is important to note that ECOWAS is the only regional economic community in Africa with specific regulations governing transhumance. Its regulations aim to improve livestock productivity and food security, enhance the environment and reduce poverty. However, these regulations (protocols), inspired by the vision of a unified and prosperous West Africa, aimed to dismantle colonial-era borders, foster economic growth, and promote a sense of shared citizenship among member states.
While the protocol lays the foundation for a borderless West Africa, it also recognizes the sovereign rights of member states to maintain public order, public health, and security. As a matter of fact, some coastal states do not allow pastoralists into their countries. For instance, Benin Republic recently banned the entry of foreign herders into its territory. Togo and Côte d’Ivoire also monitor and control the number of herders that enter their territories annually (https://theconversation.com/ecowas-rules-to-protect-pastoralists-discourage-investments-in-modern-livestock-farming-213493).
CHALLENGES BEDEVILLING THE ECOWAS PROTOCOL ON TRANSHUMANCE
1. FREE MOVEMENT VS. NATIONAL SECURITY
The ECOWAS Protocol on transhumance was inter alia, inspired by the vision of a unified and prosperous West Africa, aimed to dismantle colonial-era borders and foster economic growth among member states. By progressively removing restrictions on the movement of citizens within the community, ECOWAS has indeed facilitated trade, tourism, and cultural exchange, contributing to the interconnected sub-region.
However, the implementation of this protocol has not been without its challenges, particularly for a large and geographically central nation like Nigeria. As Nigeria is faced with a complex and intensifying insecurity crisis, fueled by banditry, terrorism, kidnapping, and various forms of organized crime, the potential for the unchecked movement of criminal elements across its extensive and often poorly managed borders has become a significant concern. The ease of entry afforded by the free movement protocol, coupled with porous borders and inadequate security infrastructure, creates a fertile ground for transnational criminal networks to operate within Nigeria, intensifying existing security challenges and introducing new dimensions of threat.
It has been often stated, in defence of the pastoralists, that some of the pastoralist are themselves victims of banditry and that militias use them, under duress, to smuggle arms into the country. It is pertinent to note that weak border controls enable the influx of foreign herders, exacerbating conflicts over land and resources in Nigeria. Rather than an outright abrogation of the protocol, which may amount to throwing the baby out with the bath water, the government of each state may have to look inward and address the weaknesses in its borders and frontally attack. See the cases of Abu v. State (2024) LPELR-62381(SC), and Apph & Ors v. Oturie (2019) LPELR-46301 (CA). (To be continued).
THOUGHT FOR THE WEEK
Almost half of the population of the world lives in rural regions and mostly in a state of poverty. Such inequalities in human development have been one of the primary reasons for unrest and, in some parts of the world, even violence. (A. P. J. Abdul Kalam).
Related
You may like
The Oracle
The Oracle: The New Digital Colonialism: Navigating AI Policy Under Foreign Tech Dominance (Pt. 4)
Published
5 days agoon
March 27, 2026By
Eric
Prof Mike Ozekhome SAN
INTRODUCTION
The last episode of this treatise concluded our examination of the preferences of the Western (US, EU) and Eastern (China) hemispheres on the subject after which we considered the dangers of weak localization and disproportionate influence of foreign technology on African ecosystems. This was followed by an analysis of the issues generated by AI policy and later we looked at what African States needs to do to tackle the challenge-using Nigeria as a case study. Today, we shall continue with same with special emphasis on the pen in the trans-continental transformation of AI technology and later x-ray the need for technological sovereignty and for crafting an indigenous AI policy agenda. We shall then conclude with an overview of lessons from abroad including the US, EU and China. Enjoy.
AI POLICY AND DIGITAL TRANSFORMATION IN AFRICA, WHO WIELDS THE PEN?
In one sentence, we wield the pen. Our governments, independent state actors, entrepreneurs, African men, women and youth all share in this responsibility. The future of Africa’s digital transformation depends on whether we choose to author our own story or allow others to continue writing it for us.
Africa is witnessing an increasing call for technological sovereignty: the ability to control our own infrastructure, data and innovations. This idea, central to decolonial frameworks, insists that we must move away from being a passive consumer of technologies and reclaim control of its digital future. Kwame Nkrumah emphasized the importance of pan-African cooperation for achieving sovereignty. That vision today extends to the digital realm, where regional collaboration and homegrown solutions are critical for breaking dependency on Western corporations. Achille Mbembe further argues that Africa should leverage indigenous knowledge systems and local resources to create technologies that reflect African values, rather than merely importing Western tools ill-suited to its unique needs.
The digital divide between Africa and the West is not merely technical; it is rooted in structural and historical inequalities. The continent’s persistent reliance on foreign technologies reflects centuries of global imbalances that continue to shape how resources and knowledge flow. A central issue is technological dependency: Africa consumes technologies made elsewhere instead of shaping them (Tyler Robinson, ‘Navigating Digital Neocolonialism in Africa’ (cigionline.org) < www.cigionline.org/static/documents/DPH-paper-Stevenson_1.pdf > Accessed on 16th September, 2025).
Global tech giants dominate Africa’s digital landscape, extracting vast amounts of data without adequate investment in local infrastructure or people. Data extraction not only perpetuates Western dominance but also strips Africa of sovereignty over its own digital futures. Without robust regulations or sufficient local technological capacity, African nations remain vulnerable to these external forces.
NEED FOR TECHNOLOGICAL SOVEREIGNITY
Against these challenges, the need for technological sovereignty becomes undeniable. Africa must not remain a passive participant in the global digital economy. We must take proactive steps to build our own technological infrastructure and policies. Sovereignty in the digital age is not just about access but about authorship: designing systems that align with African values, priorities and aspirations. Some progress is already visible. Many governments are beginning to reclaim data oversight by establishing national data centres, such as those in Benin and Togo. These centres enable local data governance and prevent exploitation. Even when international institutions provide support, African states are increasingly insisting on local ownership and oversight (ibid).
Partnerships and trade agreements have also played a role in shaping Africa’s digital transformation, sometimes limiting, sometimes enabling. The Policy and Regulatory Initiative for Digital Africa (PRIDA), funded by the European Union and implemented by the African Union, supports broadband access, harmonized digital policies, and the capacity to implement them. While the framework is influenced by European legislation, it ensures stronger protections for African citizens. The Pan-African e-Network Project, originally launched in India but now African-led, connects countries via satellite and fibre, enabling teleeducation and telemedicine across borders. It demonstrates that partnerships can succeed when they are driven and managed by Africans. Similarly, the Smart Africa Alliance was established to transform the continent into a collaborative digital market. By centring ICTs within socio-economic development agendas, the alliance promotes sustainable policies, digital infrastructure, and affordable access across its member states.
TOWARD AN INDIGENOUS AI POLICY AGENDA: RECOMMENDATIONS
While significant progress has been made, more must be done to ensure that Africa wields the pen in shaping its digital destiny. Recommendations emerging from this discussion are clear:
1. Prioritize investment in indigenous technologies and local innovation rather than relying primarily on foreign solutions.
2. Expand digital literacy and capacity-building across the continent to empower citizens to participate meaningfully in the digital economy.
3. Strengthen regional collaboration by developing a unified digital strategy that reflects Africa’s collective interests and unique needs.
4. Establish and enforce robust regulatory frameworks to protect data, safeguard citizens, and curtail exploitative practices of global tech corporations.
5. Pursue strategic partnerships with external actors only on terms that guarantee local ownership, oversight, and long-term autonomy.
6. Operationalise Ethics by Design across all AI and digital identity systems by embedding impact assessments, fairness audits, user consent, and accountability mechanisms at every stage—from policy formulation to system deployment.
7. Mandate algorithmic explainability and independent auditing for all AI models impacting critical sectors such as healthcare, credit, policing, and education, ensuring transparency and bias detection.
8. Localise and secure data within national borders by requiring sensitive national datasets to be stored in certified local data centres, supported with investments in infrastructure and cybersecurity.
9. Extend NDPA protections to vulnerable and marginalised communities by enabling inclusive identity verification methods, community-based registration agents, and exemptions for hard-to-reach populations.
10. Establish a Public Interest Technology Task Force composed of ethicists, technologists, civil society, and legal scholars to provide oversight and human rights evaluations before new systems are rolled out.
11. Prioritise national capacity building in data ethics and digital rights through mandatory training for government agencies, judiciary, MDAs, and law enforcement bodies.
12. Make digital consent comprehensible, accessible, and verifiable by requiring plain-language terms, local translations, audio/visual options, and legal avenues to revoke consent.
13. Decentralise and democratise identity systems by adopting a federated model where local governments, trusted institutions, and community actors can verify identity, reducing exclusion and dependency on centralised systems.
14. Enforce mandatory Data Protection Impact Assessments (DPIAs) for high-risk public projects, with findings made public and subject to independent review; impose strict penalties for non-compliance.
15. Create civic engagement pathways in digital governance through open consultations, citizen assemblies on AI ethics, participatory monitoring, and data literacy campaigns to treat citizens as democratic stakeholders.
Only by embracing these recommendations can Africa move from dependency to sovereignty. This continent must wield the pen herself, authoring a digital future rooted in African values and aspirations and ensuring full participation in the global digital economy on our own terms.
LESSONS FROM THE EU, US AND CHINA
THE EU
1. The European Union’s AI Act provides a tiered, risk-based approach to regulating artificial intelligence, distinguishing between unacceptable, high, limited, and minimal risk. Obligations such as transparency, oversight, and outright bans are matched to the level of risk. For Africa, this model illustrates how to avoid over-regulating low-risk tools while ensuring strict oversight of high-risk applications.
2. Closely tied to this is the EU’s privacy-by-design approach, anchored in the General Data Protection Regulation (GDPR). Here, privacy safeguards, data minimisation, and “by default” protections are integrated from the outset of system design. Africa can adopt this holistic model by embedding privacy and data rights into both law and practice, with strong enforcement mechanisms.
3. The EU also prioritises transparency, accountability, and liability. High-risk systems must undergo conformity assessments, independent audits, and documentation processes. Liability frameworks are being expanded to ensure that citizens can seek redress when harmed by AI systems. This provides a template for Africa to hold developers, deployers, and regulators accountable.
4. In addition, the EU AI Act prohibits certain practices outright, such as social scoring, manipulative techniques, and some forms of biometric surveillance. Setting non-negotiable boundaries protects citizens while providing clarity for innovators.
5. Finally, the EU demonstrates the value of operational readiness and compliance infrastructure. GDPR compelled companies to build compliance units (e.g., privacy officers, auditing mechanisms), which now serve as the foundation for AI oversight. Africa should similarly invest early in institutions, regulators, and technical capacity to ensure that laws are enforceable in practice.
THE UNITED STATES
1. The United States illustrates how rapid executive action can shape emerging technologies even before legislation matures. For instance, Executive Order 14110 (2023) on AI mandated agency risk assessments, civil rights considerations, and workforce planning. Africa can similarly use presidential or ministerial directives to establish immediate governance frameworks while legislative processes catch up.
2. The Blueprint for an AI Bill of Rights (2022) articulates citizen protections, including transparency, fairness, privacy, and the right to opt out. This offers a model for Africa to enshrine AI-related rights in constitutional or statutory instruments, ensuring that protections are not left as policy afterthoughts.
3. The U.S. also underscores the importance of equity and non-discrimination. Policies emphasize audits, training, and oversight in areas such as employment, housing, health, and policing to prevent algorithmic bias. Africa should follow this lead by embedding protections for marginalized groups into its AI strategies, addressing gender, ethnic, and rural-urban disparities
4. At the same time, the U.S. demonstrates how innovation and competition can be promoted alongside regulation. Federal agencies such as NIST, together with grant schemes and research funding, stimulate startups and infrastructure growth. For Africa, combining protective regulation with incentives for local innovation will ensure that governance does not stifle creativity or competitiveness.
CHINA
1. China’s national AI strategy highlights the power of entrepreneurial hubs and incubators as engines of innovation. Africa can adapt this model by building regional AI hubs that connect academia, industry, and startups while attracting diaspora talent.
2. China also leveraged digital financial inclusion by integrating AI into mobile payments and lending platforms. With Africa’s mobile money infrastructure already strong (e.g., M-Pesa), scaling digital finance to directly support entrepreneurs could accelerate indigenous innovation.
3. Through initiatives like Made in China 2025, China has pursued indigenous innovation and self-sufficiency, investing in local chip design, cloud infrastructure, and AI frameworks. Africa, too, must localize its data, develop homegrown AI models, and reduce dependence on foreign technology.
4. The country’s advances in AI for healthcare: diagnostics, wearables, predictive analytics, demonstrate how technology can bridge systemic service gaps. Africa could apply similar solutions to leapfrog chronic shortages in health systems.
5. China’s Digital Silk Road shows how digital exports can extend influence abroad. Africa can flip this approach by creating an African Digital Corridor, exporting its innovations and setting standards based on African values.
6. At the same time, China’s struggles with semiconductors underscore the risks of supply chain dependency. Africa must build resilience through semiconductor R&D, local cloud infrastructure, and open-source software ecosystems.
7. Finally, China shows how standards and regulation can be tools of global influence. By actively shaping AI governance in developing regions, it is carving out international leadership. Africa, through the AU and AfCFTA, can harmonize its own AI standards, strengthening its voice in global digital policy debates. (To be continued).
THOUGHT FOR THE WEEK
“Over time I think we will probably see a closer merger of biological intelligence and digital intelligence”. (Elon Musk).
Related
The Oracle
The Oracle: The New Digital Colonialism: Navigating AI Policy Uunder Foreign Tech Dominance (Pt. 3)
Published
2 weeks agoon
March 20, 2026By
Eric
By Prof Mike Ozekhome SAN
INTRODUCTION
The last installment of this intervention traced the evolution of AI, reviewed notable developments in its trajectory; its African dimension and policy trend therein and beyond. This week’s feature goes further afield, reviewing the position in the US, the EU and China. Thereafter we consider the dangers of weak localized and disproportionate influence of foreign technology on African innovation ecosystem. This is followed by a discussion of the issues generated by AI policy and what African States need to do – using Nigeria as an example/template. Enjoy.
USA, EU, CHINA’S PREFERENCES (Continues)
In Africa, the policy landscape is accelerating but uneven. The Global AI Index (www.diplomacy.edu/resource/report-stronger-digital-voices-from-africa/ai-africa-national-policies/ > (Diplomacy.Edu) Accessed on 10th September, 2025) categorizes most African countries as lagging: Egypt, Nigeria and Kenya as nascent, and Morocco, South Africa and Tunisia as waking up (Techpoint Africa, < www.facebook.com/TechpointAfrica/posts/africas-ai-policy-why-a-copy-and-paste-approach-will-fail-this-time-every-countr/1064672189125910/> (Facebook.com, 22nd July, 2025) Accessed on 10th September, 2025). Mauritius led with an AI strategy (Mauritius Artificial Intelligence Strategy, November, 2018 < https://treasury.govmu.org/Documents/Strategies/Mauritius%20AI%20Strategy.pdf > (Treasury.govmu.org) Accessed on 10th September, 2025), followed by Kenya’s AI and blockchain task force (2019) (Kenya Artificial Intelligence Strategy < https://ict.go.ke/sites/default/files/2025-03/Kenya%20AI%20Strategy%202025%20-%202030.pdf > (Ict.go.ke) Accessed on 10th September, 2025), its Digital Master Plan (2022) (Kenya Digital Master Plan, 2022 – 2032 < https://cms.icta.go.ke/sites/default/files/2022-04/Kenya%20Digital%20Masterplan%202022-2032%20Online%20Version.pdf > (Ict.go.ke) Accessed on 10th September, 2025), and Rwanda’s AI policy (Thompson Gyedu Kwarkye, ‘AI policies in Africa: lessons from Ghana and Rwanda’ (TheConversation.com, 25th April, 2025) < https://theconversation.com/ai-policies-in-africa-lessons-from-ghana-and-rwanda-253642 > Accessed on 10th September, 2025), which reflects its national security priorities. Nigeria, Ghana, Uganda, Algeria and South Africa have also announced or drafted
AI policies, often framed around economic growth and innovation.
Continental initiatives, such as the African Union’s Digital Transformation Strategy (African Union, ‘THE DIGITAL TRANSFORMATION STRATEGY FOR AFRICA (2020-2030)’ < https://au.int/sites/default/files/documents/38507-doc-dts-english.pdf > Accessed on 10th September, 2025) and the World Bank’s DE4A program (< www.worldbank.org/en/programs/all-africa-digital-transformation > Accessed on 10th September, 2025), emphasize infrastructure, skills and inclusion, but implementation remains fragmented.
Still, foreign influence looms large. Many African AI and data governance frameworks are modeled directly on external templates, particularly the EU’s General Data Protection Regulation (GDPR) (< https://gdpr.eu/what-is-gdpr/ > Accessed on 10th September, 2025). Nigeria’s NDPR (< https://nitda.gov.ng/wp-content/uploads/2021/01/NDPR-Implementation-Framework.pdf > Accessed on 10th September, 2025), a near copy of the GDPR, introduced concepts like consent, data subject rights and cross-border transfers. While it helped raise awareness and created local compliance industries, it omitted key protections (such as breach notifications, children’s rights and strong enforcement). Similar GDPR-inspired laws have been enacted in Ghana, Kenya and South Africa. This copy-paste strategy provides structure but often lacks localization, leaving gaps in enforcement and contextual fit (Bolu Abiodun ‘Africa’s AI policy: Why a copy and paste approach will fail this time’ (Techpoint.Africa, 22nd July, 2025) < https://techpoint.africa/insight/africas-ai-policy-copy-paste/ > Accessed on 10th September, 2025).
Critics warn that the real problem is not copying but exclusion. As Mozilla’s Kiito Shilongo and other researchers argue, many African AI policies are drafted with heavy input from foreign agencies and consultants, while local communities, startups, and civil society are sidelined. This participatory deficit means policies risk reflecting donor interests more than citizens’ rights. In Rwanda, for example, AI policy was shaped through government agencies and international NGOs with a strong focus on security. Ghana’s was more inclusive, involving startups, academia and telecoms, but leaned toward development goals over safety. Both approaches highlight the political nature of AI policymaking and the different ways foreign partnerships shape outcomes.
DANGERS OF WEAK LOCALIZATION
The consequences of weak localization are serious. AI systems trained abroad often misidentify African faces, misinterpret African languages, and replicate systemic biases, raising concerns about discrimination and digital rights. Yet, while African AI strategies often mention ethics and human rights, we lack the institutions and consultation processes such as the six-month public consultations typical in the EU that make such commitments enforceable. As Shilongo notes, perhaps Africa should copy less of the content of Western frameworks and more of the participatory processes that make them legitimate.
In short, Africa’s AI policy moment reflects both progress and peril: policies are emerging, but without deeper local ownership, institutional capacity and participatory design, we risk entrenching dependency rather than building sovereignty.
DISPROPORTIONATE INFLUENCE OF FOREIGN TECHNOLOGY ON AFRICAN INNOVATION ECOSYSTEMS – REAL LIFE EXAMPLES
The critique of foreign dominance in Africa’s digital space is best illustrated through concrete examples that reveal how global technology companies shape local innovation ecosystems, often in ways that mirror older colonial patterns of extraction and dependency.
Language exclusion: Africa is home to over 2,000 languages (https://alp.fas.harvard.edu/introduction-african-languages > Accessed on 16th September, 2025), around one-third of the world’s total, yet, as of May 2024, Apple’s Siri, Google Assistant and Amazon’s Alexa collectively support none of them. This linguistic exclusion reinforces dependency on foreign platforms while marginalizing African cultures in the digital sphere.
Exploited labour: In 2019, South African graduate Daniel Motaung began work as a content moderator for Sama, a subcontractor for Facebook. Relocated to Kenya, he earned $2.20 per hour to review traumatic content described by colleagues as “mental torture”. When Motaung and others attempted to unionize, he was dismissed and later sued Sama and Facebook for union-busting and exploitation. This case underscores how “responsible outsourcing” in Africa often conceals exploitative labor practices.
Resource extraction: The Democratic Republic of Congo holds nearly half of the world’s known cobalt reserves, vital for powering smartphones and electric cars. In Kolwesi alone, thousands of children reportedly mine cobalt under dangerous conditions, while profits flow largely abroad. Much like colonial resource extraction, Africa provides the raw materials that power global digital economies but sees little local benefit.
Surveillance and bias: In Johannesburg, Vumacam has deployed more than 5,000 CCTV cameras integrated with AI analytics for private security firms. Activists warn that this reliance on facial recognition, already proven to misidentify darker-skinned faces at disproportionately high rates entrenches South Africa’s long history of racialized surveillance. Foreign-designed technologies thus risk reinforcing systemic inequalities under the guise of safety.
Connectivity myths: Mark Zuckerberg’s Internet.org initiative (launched in 2013) was marketed as a philanthropic effort to connect the unconnected. Projects like Free Basics promised free access to online services in over 60 countries. Yet leaked documents revealed that millions of Global South users were secretly charged for “free” data, generating nearly $100 million in 2021 alone. Framed as altruism, these projects extended Facebook’s market reach while extracting revenue from vulnerable populations.
Taken together, these examples reveal how global technology firms, mostly U.S.-based, operate in Africa with strategies that echo colonial logics. They build critical infrastructures (clouds, platforms, connectivity) aligned with their own commercial interests, entrench market monopolies and rely on low-wage labour or raw resource extraction with little local reinvestment. Their technologies often embed cultural and racial biases reflective of narrow developer demographics, yet are exported globally under the banner of “progress,” “development,” or “connecting people.”
As Western jurisdictions strengthen data protection and AI regulation, African countries often remain vulnerable due to weaker frameworks and limited enforcement capacity. This asymmetry creates fertile ground for digital colonialism; a modern-day “Scramble for Africa” where foreign firms extract and control data much like colonial powers once extracted minerals (Danielle Coleman, ‘Digital Colonialism: The 21st Century Scramble for Africa Through Extraction and Control of User Data and the Limitations of Data Protection Laws’ (Law.Umich.Edu) < https://repository.law.umich.edu/mjrl/vol24/iss2/6/ > Accessed on 16th September, 2025). Under the guise of innovation, these companies wield disproportionate influence over African AI and digital ecosystems, shaping policy choices, technical architectures, and even societal norms, while leaving Africa in a position of dependency rather than empowerment.
THE ISSUES GENERATED BY AI POLICY
While global AI policy is advancing through risk-based regulation, ethical standards, and participatory governance, Africa’s AI landscape remains fragmented, heavily modeled on external frameworks, and vulnerable to digital dependency. The disproportionate power of foreign technology companies manifested in many ways including linguistic exclusion, exploitative labour, resource extraction, biased surveillance and deceptive connectivity projects echoes colonial logics of extraction and control. Without decisive intervention, the continent risks entrenching digital colonialism, a new form of dependency in which policy choices, infrastructures and innovation ecosystems are shaped externally, undermining both democratic values and long-term development.
WHAT AFRICAN STATES MUST DO
To avoid replicating historical asymmetries in digital form, African states must assert sovereignty over their AI policies, data governance and digital infrastructures. This requires moving beyond passive adoption toward active regulatory design, investment in local infrastructure (such as data centers, compute resources and research capacity) and strengthening institutional oversight with technically competent regulators. Equally critical is the creation of participatory policy processes that center human rights, economic development, and indigenous innovation. Only by combining legal safeguards, domestic capacity, and strategic partnerships built on equality, not dependence, can Africa transform digital technologies into engines of genuine development rather than renewed extraction.
THE NIGERIAN EXAMPLE: DATA SOVEREIGNTY OR DATA SURRENDER
With the rapid expansion of national digital infrastructure across Nigeria, a far more pressing issue has risen to the fore: the question of who truly owns and governs the data that powers this infrastructure. As digital systems increasingly underpin the delivery of public services, financial transactions, education platforms, health records, and national security functions, data becomes not only a technical asset but a core element of state power. Data sovereignty means that data generated within a country’s borders is governed by that nation’s laws and regulatory frameworks; this ensures local control over data access, storage, and usage (Folashadé Soulé, ‘Digital Sovereignty in Africa: Moving beyond Local Data Ownership’ CIGI (2024) <https://www.cigionline.org/publications/digital-sovereignty-in-africa-moving-beyond-local-data-ownership/> Accessed on the 14th of June, 2025.). It has become a critical aspect of national policy and governance. In Nigeria, this issue has grown increasingly complex, particularly in light of the pervasive presence of foreign cloud providers, offshore data processors, and international technology firms that collect, process, and sometimes export Nigerian user data without clear or enforceable jurisdictional frameworks.
Foreign digital platforms have historically played a central role in the Nigerian data ecosystem either as providers of essential services like email, storage, and analytics, or as developers of social media and financial applications used daily by millions of Nigerians (Fola Odufuwa et al., ‘Digital Technology Adoption by Microenterprises: Nigeria Report’ (2024) <https://www.researchgate.net/publication/383202125_Digital_Technology_Adoption_by_Microenterprises_Nigeria_Report> Accessed on the 14th of June, 2025.). While these platforms often promise global connectivity and technical sophistication, they also introduce serious risks. Data generated within Nigeria is frequently routed through foreign servers, stored in jurisdictions with significantly different privacy protections, and subjected to external political and commercial interests (Patrick Aloamaka, ‘DATA PROTECTION AND PRIVACY CHALLENGES IN NIGERIA: LESSONS FROM OTHER JURISDICTIONS’ UCC Law Journal (2023) 3 (1).). This dislocation of Nigerian data is what scholars term extraterritorial data flow which raises serious questions about control, privacy, and national security. The potential misuse of this data, whether for commercial exploitation, surveillance, or even geopolitical leverage, makes the issue of domestic data governance all the more urgent. (To be continued).
THOUGHT FOR THE WEEK
“Over time I think we will probably see a closer merger of biological intelligence and digital intelligence”. (Elon Musk).
Related
The Oracle
The Oracle: The New Digital Colonialism: Navigating AI Policy Under Foreign Tech Dominance (Pt. 2)
Published
3 weeks agoon
March 13, 2026By
Eric
By Prof Mike Ozekhome SAN
INTRODUCTION
The inaugural installment of this piece was necessarily foundational, providing the background to the emergence of AI; how it transformed the digital space; applicable regulatory frameworks; its algorithimic transparency/accountability; its ethical dimensions and implications and the threat of foreign tech dominance/digital colonialism. This sophomore edition traces the evolution of AI; notable developments; the history of technological dependency in Africa and policy trends in the continent and beyond. Enjoy.
THE EVOLUTION OF AI
AI has progressed from rule-based systems to machine learning and deep learning models capable of autonomous decision-making. Applications range from healthcare diagnostics to autonomous vehicles, predictive policing, and financial algorithms. While AI enhances productivity, concerns arise over:
Job displacement due to automation. (Brynjolfsson, E., & McAfee, A. (2014). The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies. W. W. Norton & Company).
Surveillance capitalism, where personal data is exploited for profit.
Algorithmic governance, where AI influences public policy without sufficient oversight (O’Neil, C. (2016). Weapons of Math Destruction. Crown Publishing.). The conceptual origins of Artificial Intelligence (AI) can be traced to the mid-20th century, when pioneering figures such as Alan Turing and John McCarthy began to explore the possibility of creating machines capable of simulating human intelligence. Turing’s seminal 1950 paper, “Computing Machinery and Intelligence,” posed the provocative question, “Can machines think?”—a question that laid the philosophical groundwork for modern AI research. (Turing, Alan M. “Computing Machinery and Intelligence.” Mind 59, no. 236 (1950): 433–460.) McCarthy, who coined the term “artificial intelligence” in 1956, convened the historic Dartmouth Conference, widely considered the birth of AI as a formal field of inquiry (McCarthy, John et al., “A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence,” (1955).
EARLY ASPIRATIONS AND TECHNOLOGICAL MILESTONES
Early AI efforts focused on symbolic logic, rule-based systems, and expert systems, which relied on hand-coded rules to simulate decision-making processes. These systems, while limited in scope, found application in fields such as medical diagnostics (e.g., MYCIN) and chess-playing algorithms. The emergence of machine learning in the late 20th century—particularly supervised learning techniques—ushered in a new era in which machines could learn patterns from data rather than rely solely on pre-programmed rules.
The exponential growths in computing power, availability of big data, and algorithmic innovation have since culminated in what many scholars refer to as the “AI revolution.”
NOTABLE DEVELOPMENTS
Notable developments include deep learning techniques powered by artificial neural networks, natural language processing exemplified by large language models (LLMs), and computer vision systems that rival or exceed human performance in specific domains (LeCun, Yann, Bengio, Yoshua, and Hinton, Geoffrey. “Deep Learning.” Nature 521, no. 7553 (2015): 436–444).
FROM AUTOMATION TO AUTONOMY
AI has transitioned from automating repetitive tasks to performing complex cognitive functions previously thought to be the exclusive domain of humans. Self-driving cars, AI legal assistants, autonomous drones, and AI-generated art demonstrate the breadth of AI’s applications. As these systems grow in sophistication, they increasingly exhibit autonomy—the capacity to make decisions and take actions without direct human intervention. This shift raises profound questions about accountability, transparency, and control.
ACCOUNTABILITY, TRANSPERENCY AND CONTROL
For example, autonomous weapons systems capable of selecting and engaging targets without human oversight challenge existing norms under international humanitarian law (IHL). Similarly, AI systems deployed in judicial or parole decisions raise concerns about bias, fairness, and due process, especially when the logic behind decisions is opaque even to their developers—a phenomenon referred to as the “black box problem.” (Pasquale, Frank. The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press, 2015).
HISTORY OF TECHNOLOGICAL DEPENDENCY IN AFRICA
The critique that digital technologies embody, enable, or reproduce colonial power relations is not new. As early as the 1970s, debates around communication and technology were linked to questions of sovereignty, inequality and dependency. In March 1976, at the Non-Aligned Media Seminar in Tunis, representatives from 38 NAM states and 13 observers declared that “colonialist, imperialist and racist powers have created effective means of information and communication which are conditioning the masses to the interests of these powers.” This seminar built on earlier efforts of the Non-Aligned Movement (est. 1955), which, by its 1973 Algiers summit, had embraced the decolonization of information, communication, and culture as part of the wider struggle for independence.
The Tunis meeting marked the birth of the New World Information and Communication Order (NWICO); a call to redress global inequalities in media ownership, information flows, and infrastructure. Tunisian minister Mustapha Masmoudi highlighted the imbalance: “Almost 80 percent of the world news flow emanates from the major transnational agencies; however these devote only 20 to 30 percent of news coverage to the developing countries”. NWICO gained traction at UNESCO, culminating in the 1980 MacBride Report, which directly challenged the Western doctrine of “free flow of information.” The United States and the UK eventually withdrew from UNESCO in protest, but NWICO left a lasting intellectual and political legacy: it framed global communication as a site of structural inequality and technological dependency.
Building on these debates, communication scholars introduced the idea of electronic colonialism. Herbert Schiller’s Mass Communication and American Empire argued that U.S. commercial media systems were becoming instruments of empire. Thomas McPhail later extended this, defining electronic colonialism as “the dependent relationship of poorer regions on post-industrial nations, caused and established by the importation of communication hardware and foreign-produced software, along with engineers, technicians and related information protocols” (Jacob Mahlangu, ‘Technological Apartheid: The Digital Divide Between Africa and the West’ (Sagepub.com, 6th May, 2025) < https://advance.sagepub.com/doi/full/10.31124/advance.174652029.93416488/v1#:~:text=The%20digital%20divide%20between%20Africa%20and%20the%20West%20represents%20not,colonialism%2C%20and%20contemporary%20digital%20imperialism). This lens made clear that dependency was not only economic but also infrastructural and epistemic.
Parallel critiques arose in anthropology and development studies. Post-development theorists such as Arturo Escobar and James Ferguson argued that development projects often failed to empower but instead re-entrenched colonial hierarchies. They identified technology as a key tool in this process, framed as a “solution” but often deployed in paternalistic ways that deepened dependency. ICT4D (Information and Communication Technologies for Development) initiatives of the late 1990s and early 2000s exemplified this tension. While promising to democratize knowledge and spur development, many projects replicated older patterns: reliance on imported technology, disregard for local context, and reinforcement of global asymmetries.
By the late 2000s, scholars in postcolonial computing extended these critiques to human–computer interaction (HCI). They demonstrated how design practices in “development tech” mirrored colonial flows: low-cost labor and raw materials from the Global South, transformed into finished products exported back under narratives of benevolence. The One Laptop Per Child (OLPC) project (< https://laptop.org/ > Accessed on 16th September, 2025) epitomized this, marketed as a humanitarian innovation but dependent on the feminized labour of Asian workers in global supply chains.
In 2013, Dal Yong Jin introduced platform imperialism, analyzing how U.S. tech giants like Google, Apple and Facebook exerted global dominance through platform capitalism, intellectual property regimes and cross-border expansion (Jin, Dal Yong, ‘“The Construction of Platform Imperialism in the Globalization Era.” Triple C: Communication, Capitalism & Critique. Open Access Journal For a Global Sustainable Information Society’ ( Researchgate.net, January, 2013) < https://researchgate.net/publication/275652379_Jin_Dal_Yong_2013_The_Construction_of_Platform_Imperialism_in_the_Globalization_Era_Triple_C_Communication_Capitalism_Critique_Open_Access_Journal_For_a_Global_Sustainable_Information_Society_111_145-#:~:text=Abstract,accumulation%20in%20the%20digital%20age. > Accessed on 16th September, 2025). His argument made explicit that digital platforms were not neutral infrastructures but instruments of geopolitical power.
These intellectual trajectories resonate strongly with dependency theory, advanced by Samir Amin, which argued that underdevelopment in the Global South is not accidental but structurally produced through dependence on the North. Applied to technology, this means Africa’s reliance on imported hardware, software, and infrastructures reinforces systemic subordination in the global digital hierarchy. Postcolonial thinkers like Frantz Fanon and Edward Said similarly highlighted how colonialism survives in cultural, psychological, and technological forms, keeping the Global South positioned as consumer rather than producer.
From NWICO to electronic colonialism, from ICT4D critiques to postcolonial computing and platform imperialism, the throughline is clear: each era has witnessed renewed forms of technological dependency. What changes are the technologies themselves: satellites, mass media, ICTs, platforms, and now AI, but the structural critique persists. Today’s debates on digital colonialism continue this intellectual lineage, reframing old concerns around sovereignty, extraction and dependency in terms of data, algorithms and artificial intelligence. Far from a rupture, this is the latest chapter in a long struggle for technological self-determination in Africa and the wider Global South.
AI POLICY TRENDS GLOBALLY AND IN AFRICA
Global AI policy is crystallizing around a few core themes: risk-based regulation of high-impact systems, the embedding of human rights (< https://2021-2025.state.gov/risk-management-profile-for-ai-and-human-rights/#:~:text=In%20March%202024%2C%20all%20193,the%20enjoyment%20of%20human%20rights.%E2%80%9D > (State.gov, 25th July, 2024) Accessed on 10th September, 2025) and ethics principles, and the development of technical standards to operationalize trustworthiness. The European Union’s AI (https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai > Accessed on 10th September, 2025) Act illustrates this risk-based approach by classifying systems according to potential harm and imposing proportionate obligations, while still promoting innovation. Similarly, the OECD AI Principles (< https://oecd.ai/en/ai-principles > (OECD.ai) Accessed on 10th September, 2025), the NIST AI Risk Management Framework (US) (< www.nist.gov/itl/ai-risk-management-framework > (NIST.gov) Accessed on 10th September, 2025), and UNESCO’s global AI ethics recommendations (< www.unesco.org/en/artificial-intelligence/recommendation-ethics#:~:text=Recommendation%20on%20the%20Ethics%20of%20Artificial%20Intelligence,human%20oversight%20of%20AI%20systems. > (UNESCO.Org) Accessed on 10th September, 2025) provide international benchmarks centered on transparency, accountability, robustness, and human oversight.
USA, EU, CHINA’S PREFERENCES
National strategies, however, diverge. The United States favours voluntary, sector-specific frameworks to preserve innovation flexibility (Tatevik Davtyan, ‘THE U.S. APPROACH TO AI REGULATION: FEDERAL LAWS, POLICIES, AND STRATEGIES EXPLAINED’ (scholarlycommons.law.case.edu, 24th January, 2025) < https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?params=/context/jolti/article/1172/&path_info=auto_convert.pdf > Accessed on 10th September, 2025). China pursues a state-driven, techno-industrial strategy linking AI to national development goals(Kyle Chan, Gregory Smith, Jimmy Goodrich, Gerard Dipippo, Konstantin F, Pilz ‘China’s Evolving Industrial Policy for AI’ (Rand.org, 26th June, 2025) < www.rand.org/pubs/perspectives/PEA4012-1.html > Accessed on 10th September, 2025). The EU relies on its regulatory power (“the Brussels effect”) to set global supplier standards (Marco Almada, Anca Radu, ‘The Brussels Side-Effect: How the AI Act Can Reduce the Global Reach of EU Policy’ (Cambridge.org, 19th February, 2024) < www.cambridge.org/core/journals/german-law-journal/article/brussels-sideeffect-how-the-ai-act-can-reduce-the-global-reach-of-eu-policy/032C72AEC537EBB6AE96C0FD90387E3E > Accessed on 10th September, 2025). Together, these approaches create a patchwork of norms that countries and companies must navigate. (To be continued).
THOUGHT FOR THE WEEK
“Like all technologies before it, Artificial Intelligence will reflect the values of its creators. So inclusivity matters – from who designs it to who sits on the company boards and which ethical perspectives are included” – Kate Crawford
Related


Bauchi Gov Bala Mohammed Signals Possible Defection to ADC
FG Issues Security Advisory to Nigerians in South Africa
Yusuf Tuggar Resigns As Foreign Affairs Minister
2027: ADC’ll Lose Presidential Poll If Obi is Not Fielded, Fayose Warns
Wike-led PDP Faction Holds Convention, Reelects Abdulrahman, Anyanwu
Tinubu Celebrates ‘Low-Key’ 74th Birthday Amid Economic, Security Challenges
Lagos 2027: Who Would Tinubu Choose?
Characterisation of Biomass Feedstocks Relaxation Properties Using Visco Elastic Models
The Candidate of Necessity: Why Gawuna Could Be Kwankwaso’s Trump Card in 2027
Intentional Progressive Leadership and Disciplined Security: Catalysts for Unlocking Possibilities
Dangote Refinery, Fuel Price and the Principle of Back of Forth
WAEC Releases Results of CB-WASSCE 2026-First Series for Private Candidates
The Oracle: The New Digital Colonialism: Navigating AI Policy Under Foreign Tech Dominance (Pt. 4)
Lagos 2027: Who Would Tinubu Choose?
Trending
-
Opinion4 days agoCharacterisation of Biomass Feedstocks Relaxation Properties Using Visco Elastic Models
-
Opinion4 days agoThe Candidate of Necessity: Why Gawuna Could Be Kwankwaso’s Trump Card in 2027
-
Opinion4 days agoIntentional Progressive Leadership and Disciplined Security: Catalysts for Unlocking Possibilities
-
Featured4 days agoDangote Refinery, Fuel Price and the Principle of Back of Forth
-
News5 days agoWAEC Releases Results of CB-WASSCE 2026-First Series for Private Candidates
-
The Oracle5 days agoThe Oracle: The New Digital Colonialism: Navigating AI Policy Under Foreign Tech Dominance (Pt. 4)
-
Headline3 days agoLagos 2027: Who Would Tinubu Choose?
-
Opinion3 days agoPDP Crisis: Illegal Factional Convention is a Direct Assault on Party Constitution and Democracy

