Followers

Wednesday, January 27, 2016

Ezekiel Mutua, Bloggers And The Dangers Of GoK's Single Story


Ezekiel Mutua undoubtedly has a knack for self-promotion. When I first met him as Secretary General of the Kenya Union of Journalists more than a decade ago, I could tell he was a man of no small ambition. Today, as head of the Kenya Film Classification Board, he has found a way to insert the previously obscure regulator into the limelight.

However, the way he has gone about it in complete disregard of what the law says about his organization’s mandate. The laws he claims give the KFCB powers to police what Kenya’s media broadcasters carry between 5 a.m. and 10 p.m. (the so-called “watershed”) actually do nothing of the sort.

And this is not the first time the Kenyan Government has tried to use the organisation as a de-facto media regulator. In 2001, the then Minister of Information, Transport and Communications and now opposition luminary, Mr Musalia Mudavadi, published a notice in the Kenya Gazette which purported to place the media under the ambit of the KFCB, then more honestly known as the Kenya Film Censorship Board. This occasioned a six-year court battle with the Nation Media group which ended in a High Court judgement quashing the notice and describing it - and thus Mr Mutua’s current near identical power grab – as “not necessary or justifiable in a democratic society such as Kenya”.

Unfortunately for Kenya, Mr Mutua is more the rule rather than the exception when it comes to the Uhuru Kenyatta administration’s attitude towards the law. He is basically following a script that has been perfected by the Kenyan state which routinely exercises powers it does not have, ignores what the courts have to say when it deems it inconvenient, and appears to consider the constitution more as a set of guidelines rather than actual rules.

This attitude has been on display in the state’s reaction to the death of dozens of Kenyan soldiers in El Adde, Somalia when Al Shabaab militants overran their base two weeks ago. Under the guise of defending the national interest and stopping Al Shabaab propaganda, the government issued a warning against republishing or even retweeting gory images of dead soldiers which the terror group has uploaded online. This appears to have now mutated into a blanket ban on publishing any imagery (except its own) of the aftermath of the battle.

Pursuant to this, several people, including journalists and bloggers, have been arrested for questioning reportedly over images they shared via online platforms. The most prominent of these was Yassin Juma who spent the last weekend in a cell after being arrested for posting images of burning KDF vehicles, and Eddy Reuben Illah who has been arraigned in court for allegedly sharing pictures of dead soldiers with members of a WhatsApp group.

But is doing this actually illegal? Initially, media reports about the government’s warning cited the Penal Code Section 66A which appears to justify the government’s actions.  In fact, a widely circulated charge sheet indicated that Mr Illah would be charged under that law. What the media failed to highlight was that the section was part of the controversial Security Laws Amendment Act and had been struck off as unconstitutional by the courts.

In any event, Mr Illah was actually prosecuted for contravening Section 29 of the Kenya Information and Communications Act, a Nyayo-era law that criminalizes using “a licensed telecommunication system” to either send offensive, indecent, obscene and menacing messages; or to annoy, inconvenience and cause “needless anxiety” by means of a false message.

Needless to say, none of these terms are actually defined in the law, giving wide leeway for abuse by the authorities. Even more importantly, the courts, in their ruling throwing out the previously mentioned Section 66A of the Penal Code, already comprehensively dealt with the issue of images of terror attacks.

In court, the Attorney General had justified the introduction of the amendment by arguing that “freedom of expression has been abused by the media in publishing pictures of fatally injured people and of security operations, to the advantage of the publicity sought by terrorists.” However, in rejecting this the court declared:

“This new offence under the Penal Code that seeks to punish 'insulting, threatening, or inciting material or images of dead or injured persons which are likely to cause fear and alarm to the general public or disturb public peace' thus limits the freedom of expression to a level that the Constitution did not contemplate or permit, and in a manner that is so vague and imprecise that the citizen is likely to be in doubt as to what is prohibited.”

The parallels with the aforementioned KICA Section 29 are hard to ignore. Essentially, the government is doing an Ezekiel Mutua, claiming to exercise powers it does not have and ignoring court rulings that say it does not have them. Now, none of this is to say that publishing images of dead KDF soldier is a good idea. However, the government claims it is illegal, which it clearly isn’t and is using the law to intimidate those who present a different narrative from the one it is propagating.

An even more sinister reason is to be found in the words of one of the bloggers hauled in for questioning by the police. Cyprian Nyakundi, who spent two days in police custody before being freed on intervention of the Office of the Director of Public Prosecution, said he was questioned on “the whereabouts of other wanted bloggers and why he was critical of government at large.”

Thus this is a thinly veiled attempt, not to preserve national security, but to stamp out dissent. It fits into a pattern of media intimidation which has seen journalists who did not toe the government line fired from mainstream newspapers reportedly at the behest of State House. That campaign has now reached the shores of Kenya’s vibrant social media scene.

Like Mr Mutua, the Uhuru government has nowadays developed a knack and taste for self-aggrandizement. But we should all be very concerned when it is willing to subvert the law to ensure that its story is the only one that can be told.


4 comments:

Anonymous said...

Dear Gathara,

But what can we do. When we see the huge train rushing into an abyss with all of us on board, what can we the citizens do? Where do we find a bigger imagination for our Kenyan existence; this is not just a clamp down in bloggers, this is a clamp down on a different imagination of and for Kenya. Despite everything we have gone through, it is such a terrible betrayal. The country is wounded, morally and in every other way. It is a traumatised nation. How can we citizens who can see the darkness approach break the trance and free our spirits? What do you suggest? Or do we give up and let what will come come?

Gathara said...

I think the first and most important thing we can do is to resist the chaining of imagination. We have to keep the dream of a better Kenya alive by constantly articulating and sharing it and refusing to let it die. Then we must begin to organize, to bring together like-minded folks who can amplify one another's voices and make it expensive for those who wish to take away our liberties. But above all, we must abhor the silence.

thanida said...

keep up the good work.so this post will be helpful for all those.Very nice points you have here.
เว็บย่อลิ้ง
เว็บย่อลิ้งค์
ย่อลิ้ง
ย่อurl
ย่อเว็บ

Asore Corp said...

📁ARE YOU ABSOLUTELY IN NEED OF THE SERVICES OF A PROFESSIONAL HACKER?(CATCHING A CHEATING SPOUSE[Phone Hack], RECOVERY OF LOST FUNDS, CREDIT SCORE UPGRADE, WEBSITE HACK...)
High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
Providing value added services to clients as a hacker has been our sustaining goal.
Are you faced with cyber challenges like
💰Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
📲 Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
💳Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
🅱️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
The company is large enough to provide comprehensive range of services such as.
• Email hacks📲
• Hacking of websites.📲
• Uber free payment hacks.📲
• website hack.📲
Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
Contact:
✉️Email: clarksoncoleman(at)gmail • com.
Theglobalkos(at)gmail •com.
©Global KOS™
2030.•√