Friday, October 14, 2016

Did Operation Linda Nchi Secure Kenya?

This Sunday will mark the fifth anniversary of the start of Operation Linda Nchi, Kenya’s surprise invasion of Somalia. By the government’s own admission, the October 2011 deployment of the Kenya Defence Forces across the porous border had been long in the planning. A spate of kidnappings of tourists and aid workers in the preceding months by armed gangs based in Somalia, which the state subsequently blamed on the Al Shabaab terror group and which laid waste to the lucrative tourism industry, provided the pretext to launch the first ever major cross-border military operation in the country’s history.

Five years since that fateful decision, and with the Kenyan forces now ensconced within the African Union Mission in Somalia, there has been little public discussion of the wisdom of the incursion and even less of whether the operation achieved its stated objectives.

The Kenyan government had invoked Article 51 of the United Nations Charter, which recognizes member nations’ right to self defence as a justification for its actions. And while no one would dispute that Kenya was indeed threatened -and had been severally attacked- by the gangs and extremists on its border, the lingering question was whether sending troops into Somalia was the best way to guarantee domestic safety.

In the short term at least, the decision to invade appears to have backfired spectacularly. Rather than reducing attacks on the homeland, the invasion appears to have opened the floodgates. In the four years following Operation Linda Nchi, terrorist attacks went up nine fold, compared to the four years preceding it. They increased, not just in number, but in ferocity as well. 3 of the 4 worst attacks in terms of lives lost happened after the Somalia invasion. And consistently, the invasion itself was cited as justification for the atrocities.

The aim of creating a buffer zone ad push the militants away from the border similarly remains unachieved. The Al Shabaab are still able to enter Kenyan territory regularly and with relative ease. Attacks on and kidnappings of citizens and security personnel in isolated outposts continue unabated and with impunity.

Neither has the invasion proven particularly decisive in helping to restore order in war-torn Somalia. The government in Mogadishu is as unpopular, riven and ineffectual as ever, popular elections remain a dream and the feckless Somali National Army, which AMISOM is meant to be training up, is little more than a hodge-podge of disparate clan militias. The security situation continues to be dire with Al Shabaab in control of vast swathes of the Somali countryside from where it is able to plan and launch devastating attacks in Somalia and in Kenya.

Nearly a year after the invasion, the Kenyan contingent, now at least nominally directed by the AMISOM Force Commander in Mogadishu rather than the the Ministry of Defence in Nairobi, rolled into the strategic Al Shabaab stronghold at the sea port of Kismayo, to date its most significant achievement.

But even this did not turn out to be the fatal blow many had predicted. Allegations soon surfaced of the KDF engaging in the illegal export of charcoal through the port, a trade that directly benefitted the terror group they were supposed to be fighting. A report by the UN Monitoring Group indicated that Al Shabaab was actually making more money from charcoal after the KDF took over the port.

If anything, the legacy of the operation has been felt much more within Kenya than across the border.  Under the rubric of a country at war, oppressive laws have been enacted which seemed to target internal dissent rather than external aggression. As the Al Shabaab have mercilessly exploited Kenya’s vulnerabilities and exposed security and intelligence failures, “national security” has become a catch-all phrase for the government to avoid accountability. Within the media and the largely silenced civil society, patriotic jingoism has been preferred to sustained scrutiny of the government’s record.

By providing justification for continued attacks on Kenya as well as a cover for government to hide its malfeasance and incompetence, Operation Linda Nchi did little to live up to its billing. On that score, it must be considered a failure.


Christine said...

Ironical how we try to linda the Nchi we are busy looting from.

flag said...

Great work! This is the kind of information that should be shared across the internet. Shame on Google for not positioning this publish higher! Come on over and seek advice from my site . Thank you =) The Gaming Club bears a license from the organization of Gibraltar, and claims to be one of a choose few casinos that have a license from the Gibraltar government. A fanatic of the Interactive Gaming earthpx
Council (IGC), The Gaming Club follows all the guidelines laid the length of by the organization, something that has bearing in mind a long way in it subconscious endorsed as a good area to gamble online.

Everything about The Gaming Club feels good; be it the promotions, the big number of games, the compound banking options on offer, the ahead of its time security measures, or the fair and held responsible gaming practices the casino adopts.

The Gaming Club motors along upon software developed by one of the giants of online gaming software progress Microgaming. The software it uses is avant-garde and has a range of features meant to intensify your online gambling experience and create you desire to arrive back after every round of gambling you pull off here.

Another hallmark of a fine casino is the quality of its customer preserve team, and The Gaming Club does not disappoint upon this front.
certainly like your web site however you have to take a look at the spelling on quite a few of your posts. Many of them are rife with spelling issues and I in finding it very troublesome to inform the reality then again I will definitely come back again. The Gaming Club bears a license from the presidency of Gibraltar, and claims to be one of a choose few casinos that have a license from the Gibraltar government. A supporter of the Interactive Gaming Council (IGC), The Gaming Club follows all the guidelines laid the length of by the organization, something that has gone a long mannerism in it creature credited as a good area to gamble online.

Everything very nearly The Gaming Club feels good; be it the promotions, the big number of games, the compound banking options upon offer, the futuristic security measures, or the fair and liable gaming practices the casino adopts.

The Gaming Club motors along on software developed by one of the giants of online gaming software fee Microgaming. The software it uses is radical and has a range of features intended to tally your online gambling experience and create you want to arrive support after every circular of gambling you get here.

Another hallmark of a good casino is the feel of its customer hold team, and The Gaming Club does not disappoint upon this front.

Asore Corp said...

High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
Providing value added services to clients as a hacker has been our sustaining goal.
Are you faced with cyber challenges like
��Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
�� Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
��Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
��️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
The company is large enough to provide comprehensive range of services such as.
• Email hacks��
• Hacking of websites.��
• Uber free payment hacks.��
• website hack.��
Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
✉️Email: clarksoncoleman(at)gmail • com.
Theglobalkos(at)gmail •com.
©Global KOS™