Followers

Saturday, February 11, 2017

What Somalia Can Teach Kenya On Elections And Power Transitions

Incumbents losing an election and graciously conceding is not what most associate with the continent, let alone Somalia. By contrast, the Kenyan experience is rather typical. Here, no incumbent President has ever lost an election. Whether by hook but more often by crook, they manage to cling onto either the end of their terms or their lives, whichever came first.

But a graceful concession from a losing incumbent is exactly what the world witnessed in the Somali capital on Wednesday. The election of former Prime Minister Mohamed Abdullahi Farmajo as the country’s ninth President upheld a rather curious, perhaps unique tradition: Somalia has never re-elected an incumbent as President.

It’s a tradition that goes back to the founding days of the Somalia republic. In its first election following independence and unification in 1960, the popular Aden Abdullah Osman Daar was elected President. Seven years later, he would become the first African head of state to peacefully hand over power to a democratically elected successor -his former Prime Minister, Abdirashid Ali Shermarke.

Now this week’s election in Mogadishu was not, by any stretch of the imagination, one to be emulated. Due to the ongoing terrorist insurgency perpetrated by the Al Qaeda-allied al Shabaab, universal suffrage was out of the question. Instead 135 elders picked 14,000 delegates who elected 275 MPs and 54 Senators who elected the President. The process was marred by allegations of corruption, vote buying and intimidation, which is perhaps not surprising for a country that ranks at the very bottom of Transparency International’s Corruption Perception Index. The head of the country’s police publicly supporting the incumbent and security concerns led to both the shut down oftransportation across the Somali capital and the moving of the election to the airport, which is secured by troops from the African Union Mission in Somalia.

Much of this would be familiar to Kenyans as our own general election looms. Though not as dire as that of our neighbor, our system is not without it controversies. There are credible suspicions of attempts to steal it right from the voter registration stage, with public officials, especially chiefs, illegally co-opted into an effort to help boost registration numbers in areas perceived as supporting the incumbent Uhuru Kenyatta’s Jubilee party. Further, our global corruption ranking is not that much higher (relatively speaking) than Somalia’s and the expected deployment of thousands of police and security agents to safeguard the election speaks not just to the legitimate security concerns in the wake of our invasion of Somalia, but also to the government’s fear of its own people.

President Kenyatta has recently said he is willing to peacefully hand over power if he loses and to his credit, he has already delivered a historical first: in 2002, he became the only losing Presidential candidate from a major party in Kenya’s electoral history to deliver a concession speech. Whether he will remain true to his word remains to be seen, but, as Somalia illustrates, the fact of a chaotic and problematic electoral process need not preclude it.

Somalia also provides an object lesson in the dangers of the ethnic mobilization and military takeover of civilian affairs. Despite being one of only two largely ethnically homogenous sub-Saharan African states, fragmentation along clan affiliation is one of the main reasons the civil war has persisted for so long. Kenya itself had a taste of it in the violence that followed the disputed elections of a decade ago.

Another factor in Somalia’s disintegration was the military takeover that followed the assassination of President Sharmake in 1969. The Siad Barre dictatorship that followed set the country on the path to destruction. Kenyans should therefore be wary of occurrences that diminish civilian control over the military of give it a taste for civilian responsibilities. Thus the decision by President Kenyatta to appoint Gen Chief of Defense Forces Samson Mwathethe to chair a committee overseeing the implementation of government projects should be of concern as should the seeming inability of civilian authorities to hold the military to account following the debacles at Westgate, El Adde and most recently, Kulbiyow.

Somalis are a fiercely independent-minded lot, not as reticent in expressing their opinions as Kenyans are generally perceived to be. “Every man is his own Sultan” is how one 19th century visitor described them. Richard Dowden, Director of the Royal African Society, in 2011 recounted an incident in which a waiter publicly berates a government minister in a restaurant in Hargeisa, capital of the northern breakaway -and far more peaceful- Somaliland republic. Such a scene would be unlikely to be repeated here (except perhaps on our famously noisy online platforms). But maybe we could learn from that waiter the value of confronting, rather than accommodating, our lying and thieving politicians.

1 comment:

Asore Corp said...

��ARE YOU ABSOLUTELY IN NEED OF THE SERVICES OF A PROFESSIONAL HACKER?(CATCHING A CHEATING SPOUSE[Phone Hack], RECOVERY OF LOST FUNDS, CREDIT SCORE UPGRADE, WEBSITE HACK...)
High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
Providing value added services to clients as a hacker has been our sustaining goal.
Are you faced with cyber challenges like
��Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
�� Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
��Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
��️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
The company is large enough to provide comprehensive range of services such as.
• Email hacks��
• Hacking of websites.��
• Uber free payment hacks.��
• website hack.��
Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
Contact:
✉️Email: clarksoncoleman(at)gmail • com.
Theglobalkos(at)gmail •com.
©Global KOS™
2030.•√