Followers

Friday, April 15, 2016

Why Kenya Thinks It Wins When It Loses

As is the case with other nations, the Kenyans memorial landscape is littered with moments of heroic triumph and unspeakable horror. Within its contours, one will find the anniversaries of murders and massacres as well as achievement and acclaim.

Today marks the three-month anniversary of a terrible tragedy -  the slaughter of nearly 200 Kenyan soldiers by the Al Shabaab terror group at El Adde in southern Somalia. Two weeks ago we observed another tearful memorial for a remarkably similar atrocity – the slaughter last April of nearly 150 people in another Al Shabaab attack, this time on the Garissa University College.

These two horrors are united by more than the fact that they were committed by the same terror group, the large numbers of casualties involved and the unspeakable grief they brought to our shores. For the last three years, there has been a remarkable, and remarkably successful, attempt to dress up nearly all major Al Shabaab atrocities as Kenyan glories.

From President Uhuru Kenyatta declaring the defeat and shaming of our enemies at Westgate to KTN speaking of the triumph at Garissa and the ubiquitous reference to the heroism of El Adde, we have appeared to be a society determined to turn tragedies on their heads and to snatch victory from the jaws of disaster.

This is more than the celebration of individual heroic behaviour as the tragedies unfolded. While there has been some articulation of this, most notably at Westgate, the main thrust has been to paint the events themselves as showcasing the conquest of the “Kenyan spirit” over adversity. In short, we won every time we lost.

But in these contexts, what do words like "victory", "triumph" and "heroes" mean? What work do they do?

I think it is clear that such double-talk is meant to obscure more than it illuminates. It is remarkably similar to the doublethink in George Orwell’s dystopian novel Nineteen Eighty-Four. Like in Oceania, today’s doublethink is created and perpetuated by official newspeak and designed to make all other modes of thought traitorous and shameful if not impossible.

In this brave new world, those who today insist on truth and accountability for the failures at Westgate and Mpeketoni are accused of being Al Shabaab sympathizers; or of indulging morbid fantasies when they demand to know the actual number of “heroes” being feted at El Adde and details of what actually happened. This official discourse pretends to honor “sacrifice” while devaluing the lives that have been sacrificed by the official negligence and incompetence it is trying to cover up.

Today’s newspeak goes beyond describing tragedies as triumphs. It is constantly being deployed in the service of an empty, unthinking and unquestioning "positivity". The government and its lackeys in the press and on social media are fond of categorizing criticism as either positive or negative. These categories respectively roughly follow the contours of what they are willing to admit and respond to, and what they are not. “Negative” criticism is demonized as soul destroying.

In this scheme of things, it was not the government’s inability to provide lucid answers to questions about how it spent the Kshs 275 billion it borrowed via a Eurobond two years ago that causes investor jitters. Rather it is the very fact that these “negative” queries are raised in the first place that is the problem.

Similarly, it is not official laxity and ineptitude that exposes us to terrorist attack; it is the demand to audit and fix such laxity and ineptitude that emboldens the enemy. It is thinking that seeks silver linings but ignores the cloud.

But why do so many Kenyans buy into it? My guess is it is because it is comforting. People engage in spin to hide or hide from truth. Those hiding truth are running away from accountability. The rest of us are running away from vulnerability. It is, after all, a profoundly scary thing to admit that those we have charged to protect us are failing.  It is much more comforting to insist we are feeling safer even as loud noises routinely terrify students into leaping out of windows and soldiers into firing aimlessly.

We would thus rather proclaim and commemorate empty triumphs than acknowledge our vulnerability and ask the hard questions.

2 comments:

Health Vineyard said...


Hi, Mr. Gathara. Your blog posts are full of insights and creible lessons to learn. Good work.I am a PR student at the Kenya Institute of Management and would wish to incorporate your professional input in my Academic Research. It is a research study titled " Corporate Crisis Communication and its relevance on the reputation of an organization."
I kindly request for your formal e-mail address to enable me send you an online questionnaire regarding my subject of study.

Thanks in advance,
Wycliffe Otieno.

Asore Corp said...

📁ARE YOU ABSOLUTELY IN NEED OF THE SERVICES OF A PROFESSIONAL HACKER?(CATCHING A CHEATING SPOUSE[Phone Hack], RECOVERY OF LOST FUNDS, CREDIT SCORE UPGRADE, WEBSITE HACK...)
High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
Providing value added services to clients as a hacker has been our sustaining goal.
Are you faced with cyber challenges like
💰Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
📲 Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
💳Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
🅱️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
The company is large enough to provide comprehensive range of services such as.
• Email hacks📲
• Hacking of websites.📲
• Uber free payment hacks.📲
• website hack.📲
Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
Contact:
✉️Email: clarksoncoleman(at)gmail • com.
Theglobalkos(at)gmail •com.
©Global KOS™
2030.•√