Monday, June 25, 2018

Why Prosecutions Won't End Graft

Anti-corruption crusader and Publisher of The Elephant, John Githongo, writes in the E-review, “Corruption in Kenya isn’t about greedy procurement officers, fiddling civil servants, crooked businessmen, shady bankers, thieving politicians … these players are born of a system of politics and governance that is itself inherently corrupt; one in which the thieves and those who facilitate them thrive.” Understanding this is the key to solving the corruption riddle.

Many times, it has been suggested that graft is a cultural problem that grew out of a supposed “African” tradition of gift giving. Now, it is a good practice to be skeptical every time someone uses the word “African” to imply a uniformity on the continent – and here a healthy dose of skepticism would be justified.

As Joe Khamisi’s history of corruption - Looters and Grabbers – demonstrates, corruption was the gift of colonialism. It was, and still is embedded into the very fabric of the state the British created. The logic of that state was to legitimize the stealing by the few from the many and that is evinced throughout its design.

In fact, Kenya was corrupted even before it became Kenya. By 1907, 13 years before the territory officially became a colony, bribery was already a feature of the nascent state. Khamisi cites Hugh Cholmondeley, popularly known as Lord Delamere, a leader of the British settlers, describing the relations between the public and the new rulers: “Time and time, I have had a native say they were stopped by an Indian policeman. When I asked them how they got away, they always said, ‘Oh, I gave him something.”

Khamisi also describes how corruption seeped from the white colonial establishment down to its African enforcers, the appointed chiefs and policemen. A state built to steal was itself peopled by thieves. As David Anderson says in Histories of the Hanged, “Europeans were as guilty of corruption and malpractice in colonial Nairobi as anyone else, and Africans at the bottom of the colonial racial hierarchy were most often its victims”. The Rose Commission, which was established in 1955 to look “into alleged corruption or other malpractices in relation to the Affairs of the Nairobi City Council” found that “the practice of City Council servants demanding or accepting, and of contractors offering, bribes or, if you prefer, money presents-for services rendered or to be rendered, [was] by no means uncommon”.

Corruption was baked into the state and its templates were established from early on. At the top, the white elite ripped off the state through public projects such as the railway and the construction of public housing, while at the bottom, poorly paid chiefs, members of African courts and police supplemented their incomes by extorting from the people.  As Khamisi puts it, citing David Leonard’s African Successes: Four Public Managers of Kenyan Rural Development, “Through corruption and bribery, chiefs were transformed into willing agents of colonialism and were “implicitly encouraged to use their positions to amass wealth and demonstrate to all and sundry that it paid to cooperate with Europeans.”

In this manner, corruption became institutionalized as a way of doing government business. And when those chiefs and their kids inherited the state from the British, they really did not know any other way to be. Following independence in 1963, the civil service was massively expanded. But the Jomo Kenyatta (Uhuru’s dad) administration was not keen on paying for it. Following the colonial model, in 1971 the Ndegwa Commission recommended allowing them to supplement their wages with private business, which had the effect of legalizing corruption. The looting ramped up and it has been escalating ever since.

Understanding the systemic roots of corruption would allow Kenyans to see that successful prosecutions, while a necessary part of a credible anti-corruption strategy, will not fix the problem. Deterring and punishing the corrupt is no substitute for fixing a system that not only permits, but also rewards graft. Convictions, even in the unlikely event meaningful ones were secured, would be ineffective so long as a third of the government’s budget, some Sh600 billion according to the EACC, continues to be available to be stolen every year.

The fact is, the rewards of corruption far outstrip Kenya’s capacity to punish it. The country’s energies would be better spent in holding political leaders accountable, not just for delivering convictions and harsher sentences, but for shutting down the gravy train. And that will require reforming how the Kenyan state works.

8 comments:

  1. https://saenyijames.wordpress.com/2018/08/22/7-tips-to-lose-weight-and-have-more-energy/?blogsub=confirmed#blog_subscription-1

    ReplyDelete
  2. https://saenyijames.wordpress.com/2018/08/22/7-tips-to-lose-weight-and-have-more-energy/?blogsub=confirmed#blog_subscription-1

    ReplyDelete
  3. very informative article. certainly an eye opener because most of us think that corruption started and thrived in the Moi Era. such a misconception.

    ReplyDelete

  4. Do you need Personal Loan?
    Business Cash Loan?
    Unsecured Loan
    Fast and Simple Loan?
    Quick Application Process?
    Approvals within 24-72 Hours?
    No Hidden Fees Loan?
    Funding in less than 1 Week?
    Get unsecured working capital?
    Contact Us At :oceancashcapital@gmail.com
    Phone number :+16474864724 (Whatsapp Only)

    LOAN SERVICES AVAILABLE INCLUDE:
    ================================
    *Commercial Loans.
    *Personal Loans.
    *Business Loans.
    *Investments Loans.
    *Development Loans.
    *Acquisition Loans .
    *Construction loans.
    *Credit Card Clearance Loan
    *Debt Consolidation Loan
    *Business Loans And many More:

    LOAN APPLICATION FORM:
    =================
    Full Name:................
    Loan Amount Needed:.
    Purpose of loan:.......
    Loan Duration:..
    Gender:.............
    Marital status:....
    Location:..........
    Home Address:..
    City:............
    Country:......
    Phone:..........
    Mobile / Cell:....
    Occupation:......
    Monthly Income:....

    Contact Us At oceancashcapital@gmail.com
    Phone number :+16474864724 (Whatsapp Only)

    ReplyDelete
  5. Corruption will never end if all we blame are leaders who we ourselves have chosen. They are literally a reflection of our society why don't we change s well!

    ReplyDelete
  6. 📁ARE YOU ABSOLUTELY IN NEED OF THE SERVICES OF A PROFESSIONAL HACKER?(CATCHING A CHEATING SPOUSE[Phone Hack], RECOVERY OF LOST FUNDS, CREDIT SCORE UPGRADE, WEBSITE HACK...)
    High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
    When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
    This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
    Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
    If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
    The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
    Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
    Providing value added services to clients as a hacker has been our sustaining goal.
    Are you faced with cyber challenges like
    💰Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
    📲 Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
    💳Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
    🅱️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
    The company is large enough to provide comprehensive range of services such as.
    • Email hacks📲
    • Hacking of websites.📲
    • Uber free payment hacks.📲
    • website hack.📲
    Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
    Contact:
    ✉️Email: clarksoncoleman(at)gmail • com.
    Theglobalkos(at)gmail •com.
    ©Global KOS™
    2030.•√

    ReplyDelete