Africa News of Sunday, 5 October 2025

Source: dailynation.com

Security: Why we must adopt smarter digital defences against extremism

Terrorism in the Horn of Africa is no longer confined to battlefields or border skirmishes—it’s evolving in cyberspace.

As extremist groups like Al-Shabaab harness digital platforms to recruit, radicalise, and evade detection, the region faces a new frontier of asymmetric warfare.

Governments across Kenya, Somalia, Ethiopia, and Djibouti are racing to deploy AI-driven surveillance and mobile money tracking tools to counter these threats.

But without robust infrastructure, regional coordination, and legal safeguards, these technologies risk deepening inequality and undermining civil liberties.

The question is no longer whether digital defences are needed—but how to build them smarter, fairer, and more resilient.

According to DataReportal 2025, a platform on crucial policy goings-on, connectivity remains highly uneven across the Horn of Africa, reinforcing existing inequalities and shaping how counterterrorism technologies are deployed.

Ethiopia, for instance, has an internet penetration rate of only 21.3 percent, leaving the majority of its population offline, while Somalia records roughly 28 percent.

Djibouti, in contrast, leads the region with about 65 percent, while Kenya has achieved remarkable progress, increasing access from 65 percent to 83 percent between 2023 and 2025.

These disparities mean that while urban centers may benefit from AI-powered surveillance and real-time monitoring, borderlands and rural communities—often the very hotspots for extremist activity—remain underserved and vulnerable.


Governments have nonetheless embraced advanced technologies as part of their counterterrorism toolkit. Kenya, for example, has reported a 40 percent reduction in police response times through AI-enabled surveillance systems.

Regional authorities also use AI algorithms to map extremist networks, intercept digital communications, and track suspicious financial flows through platforms such as M-Pesa in Kenya and EVC Plus in Somalia.
Yet these successes are matched by growing risks, as extremist groups themselves leverage the same technologies.

A recent UN Security Council warning highlighted that terrorist groups across Africa are using AI and digital platforms for recruitment, fundraising, and radicalisation—demonstrating that digital technologies are both a solution and a threat.

The Horn of Africa regional bloc, Intergovernmental Authority on Development (IGAD), has called for a unified regional approach, with AI, cybersecurity, and balanced governance at its core. Dr Workneh Gebeyehu, IGAD Executive Secretary, noted that cyberattacks now account for 68 percent of successful breaches in Africa, and Kenya alone lost $83 million to cybercrime in 2023. His call for coordinated policy is both urgent and necessary.


To build resilience, the region must prioritise key policy interventions. First, governments and regional bodies should invest in equitable digital infrastructure, extending fibre and mobile networks into underserved border regions. Kenya’s rapid improvement in internet penetration in its northeastern counties shows what is possible with sustained investment.

Second, the Horn should establish shared AI-backed watch systems for detecting terrorist propaganda, tracking financial flows, and monitoring borders, with oversight mechanisms aligned with the African Union’s cybersecurity and data protection frameworks.

Third, an IGAD-level cyber threat intelligence hub could strengthen early warning and rapid response capabilities while enabling coordinated learning. Fourth, empowering local communities through digital literacy and community-based monitoring would transform populations from passive surveillance targets into active partners in security—particularly in counties like Garissa and Wajir.

Finally, robust legal frameworks are needed to regulate the use of digital technologies in security operations, ensuring that counterterrorism efforts respect privacy, uphold civil liberties, and remain subject to independent oversight.