Incumbents losing an election and graciously conceding is
not what most associate with the continent, let alone Somalia. By contrast, the
Kenyan experience is rather typical. Here, no incumbent President has ever lost
an election. Whether by hook but more often by crook, they manage to cling onto
either the end of their terms or their lives, whichever came first.
But a graceful concession from a losing incumbent is exactly what the world witnessed in the Somali capital on
Wednesday. The election of former Prime Minister Mohamed Abdullahi Farmajo as
the country’s ninth President upheld a rather curious, perhaps unique
tradition: Somalia has never re-elected an incumbent as President.
It’s a tradition that goes back to the founding days of the
Somalia republic. In its first election following independence and unification
in 1960, the popular Aden Abdullah Osman Daar was elected President. Seven
years later, he would become the first African head of state to peacefully hand
over power to a democratically elected successor -his former Prime Minister,
Abdirashid Ali Shermarke.
Now this week’s election in Mogadishu was not, by any stretch
of the imagination, one to be emulated. Due to the ongoing terrorist insurgency
perpetrated by the Al Qaeda-allied al Shabaab, universal suffrage was out of
the question. Instead 135 elders picked 14,000 delegates who elected 275 MPs and
54 Senators who elected the President. The process was marred by allegations of
corruption, vote buying and intimidation, which is perhaps not surprising for a
country that ranks at the very bottom of Transparency International’s
Corruption Perception Index. The head of the country’s police publicly
supporting the incumbent and security concerns led to both the shut down oftransportation across the Somali capital and the moving of the election to the
airport, which is secured by troops from the African Union Mission in Somalia.
Much of this would be familiar to Kenyans as our own general
election looms. Though not as dire as that of our neighbor, our system is not
without it controversies. There are credible suspicions of attempts to steal it
right from the voter registration stage, with public officials, especially
chiefs, illegally co-opted into an effort to help boost registration numbers in
areas perceived as supporting the incumbent Uhuru Kenyatta’s Jubilee party.
Further, our global corruption ranking is not that much higher (relatively speaking) than Somalia’s
and the expected deployment of thousands of police and security agents to
safeguard the election speaks not just to the legitimate security concerns in
the wake of our invasion of Somalia, but also to the government’s fear of its own
people.
President Kenyatta has recently said he is willing to
peacefully hand over power if he loses and to his credit, he has already
delivered a historical first: in 2002, he became the only losing Presidential
candidate from a major party in Kenya’s electoral history to deliver a
concession speech. Whether he will remain true to his word remains to be seen,
but, as Somalia illustrates, the fact of a chaotic and problematic electoral
process need not preclude it.
Somalia also provides an object
lesson in the dangers of the ethnic mobilization and military takeover of
civilian affairs. Despite being one of only two largely ethnically homogenous
sub-Saharan African states, fragmentation along clan affiliation is one of the
main reasons the civil war has persisted for so long. Kenya itself had a taste
of it in the violence that followed the disputed elections of a decade ago.
Another factor in Somalia’s disintegration was the military
takeover that followed the assassination of President Sharmake in 1969. The
Siad Barre dictatorship that followed set the country on the path to
destruction. Kenyans should therefore be wary of occurrences that diminish
civilian control over the military of give it a taste for civilian
responsibilities. Thus the decision by President Kenyatta to appoint Gen Chief
of Defense Forces Samson Mwathethe to chair a committee overseeing the
implementation of government projects should be of concern as should the
seeming inability of civilian authorities to hold the military to account following
the debacles at Westgate, El Adde and most recently, Kulbiyow.
Somalis are a fiercely independent-minded lot, not as
reticent in expressing their opinions as Kenyans are generally perceived to be.
“Every man is his own Sultan” is how one 19th century visitor described them.
Richard Dowden, Director of the Royal African Society, in 2011 recounted an
incident in which a waiter publicly berates a government minister in a
restaurant in Hargeisa, capital of the northern breakaway -and far more
peaceful- Somaliland republic. Such a scene would be unlikely to be repeated
here (except perhaps on our famously noisy online platforms). But maybe we
could learn from that waiter the value of confronting, rather than
accommodating, our lying and thieving politicians.
��ARE YOU ABSOLUTELY IN NEED OF THE SERVICES OF A PROFESSIONAL HACKER?(CATCHING A CHEATING SPOUSE[Phone Hack], RECOVERY OF LOST FUNDS, CREDIT SCORE UPGRADE, WEBSITE HACK...)
ReplyDeleteHigh prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
Providing value added services to clients as a hacker has been our sustaining goal.
Are you faced with cyber challenges like
��Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
�� Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
��Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
��️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
The company is large enough to provide comprehensive range of services such as.
• Email hacks��
• Hacking of websites.��
• Uber free payment hacks.��
• website hack.��
Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
Contact:
✉️Email: clarksoncoleman(at)gmail • com.
Theglobalkos(at)gmail •com.
©Global KOS™
2030.•√