The attack on the Dusit D2 hotel complex seems frighteningly familiar. From the images of people crouching along flower beds as gunshots ring out, to the smoke billowing from the top of the building, to the report of people hiding in rooms from terrorists, it feels like a rerun of the attack on the Westgate Mall in September, 2013.
There are crucial differences though. The government's response was much faster and appeared much better coordinated than it was at Westgate. The government communications are also much better managed, if not exactly more informative - at least the confusion of five years ago has not been repeated.
However, some things have sadly remained the same. The media coverage, for example, has largely consisted on regurgitating the government line and especially urging Kenyans to desist from sharing information that the state has not verified. This has been taken to ridiculous extremes, with analysts on one TV news station warning that terming the attack a terrorist act before the government declares it to be one is aiding the terrorists. On social media, there is talk of the circulation of fake pictures and news as well as constant admonitions against sharing anything. As KTN's Lindah Oguttu put it, "the less you say, the better".
Given the country's long familiarity with attacks, especially since 2011, you would think that Kenyans would have figured out a way to talk about and around ongoing operations against terrorists. Yet across both mainstream and social media, the message is the same - follow the government's lead. This is despite the state's equally long record of lying and obfuscation during and after terrorist attacks. Rather than keeping the public informed, its primary goal has been to deflect any criticism and pre-empt any calls for accountability.
For example, nearly everything government officials said about Westgate turned out to be false. In fact, while the attack itself was done and the attackers either dead or had escaped by the evening of the first day, the security forces maintained an elaborate fiction of fighting terrorists while they systematically looted the mall for three days.
Today's attack comes on the third anniversary of the sacking of a camp manned by the Kenyan contingent of the African Union Mission in Somalia during which at least 173 Kenyan troops were killed. Once again, the government's rendition of the facts surrounding the attack turned out to be largely a work of fiction. To date, it has refused to disclose the exact number of casualties and its initial descriptions of facing 3 massive truck bombs and "truckloads of suicide bombers" were designed to exaggerate the scale of the attack in order to explain away the fact that the camp had been overrun.
It is thus clear that the government cannot be trusted to provide accurate information on terror attacks. While it is equally true that the unmitigated spread of information among citizens, especially through social media, can harm security operations, when the government makes appeals for restraint, it is hard not to think of its past lies and to wonder what it is trying to hide this time.
Thus a discussion of how better to report on, or speak about, ongoing operations against terrorists must begin with addressing the state's mendacity. For as long as the government refuses to consistently deal truthfully and honestly with its citizens, it will be folly to ask them to ignore their suspicions of its motives. In any case, the idea that following an attack, citizens must suspend their thinking faculties, and blindly and unquestioningly support the government's every whim, is the very definition of being terrorized.
And it is not a very smart thing to do either.
13 comments:
harika bir yazı teşekkür ederim
It is time to address the problem of radical Islamic terrorism
It is very difficult to address issues that touch on ones religion or faith.
Terrorism is a complicated subject.
DO YOU NEED A LOAN? CONTACT US NOW FOR ANY KIND OF LOAN AT A LOW INTEREST OF 2%.(stevewilsonloanfirm@gmail.com) Whatsapp:+19029060684
Our loans are well insured for maximum security is our priority, Our leading goal is to help you get the service you deserve, Our Loan program is the quickest. We give out loan in any currency of your choice {Us Dollar, pounds, Euro, Dinar, etc} and duration of 1 to 30 years to pay back the loan (secure and unsecured).
Do you need any kind of loan and have low credit score, Have you find it difficult to get loans
from local banks and other financial institutions? solution to your financial problem is STEVE WILSON LOAN FIRM. The terms and conditions are very reasonable and considerate.
We offer a wide range of financial services which includes: Christmas Loans, Business Loans, Debt Consolidation Loans, Personal Loans, Car loans, Hotel loans, Student loans, Home Refinancing Loans with low interest rate @2% per annul for individuals, companies and corporate bodies.
Interested applicants should Contact us via email: stevewilsonloanfirm@gmail.com. Apply and be free from financial bondage. Whatsapp:+19029060684
Islamic terror against our nation will not prevail neither should we defer the business of our nation because of threats imposed by terror.
ircforumlari
harıka bir forum
I think that one should not talk about such terrible situations, for post but look for opportunities that will help them prevent or avoid casualties among civilians.
forbidden porn
Dear Sir,
We are broker firm in London-UK, we have direct Provider of BG/SBLC specifically for Lease and purchase, The provider is tested and trusted. We have been dealing with the company for paste 20 years. Interested Agent/Lessee should contact us.
Email: longmornprojectsfinance@gmail.com
Skype ID: longmornprojectsfinance@hotmail.com
Best regards
Dean Thomas.
📁ARE YOU ABSOLUTELY IN NEED OF THE SERVICES OF A PROFESSIONAL HACKER?(CATCHING A CHEATING SPOUSE[Phone Hack], RECOVERY OF LOST FUNDS, CREDIT SCORE UPGRADE, WEBSITE HACK...)
High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
Providing value added services to clients as a hacker has been our sustaining goal.
Are you faced with cyber challenges like
💰Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
📲 Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
💳Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
🅱️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
The company is large enough to provide comprehensive range of services such as.
• Email hacks📲
• Hacking of websites.📲
• Uber free payment hacks.📲
• website hack.📲
Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
Contact:
✉️Email: clarksoncoleman(at)gmail • com.
Theglobalkos(at)gmail •com.
©Global KOS™
2030.•√
vintage porno
sikiş izle
Terörü besleyip büyüten sizlersiniz, hala gelip burada tatava yapıyorsunuz. yavşaklar.
อย่าพูดอะไร
pg zone
Post a Comment