đ Securitisation Theory & Tanzaniaâs October 29th Massacres: Deconstructing the Architecture of State-Orchestrated Mass Killing

Ujasusi Blogâs East Afirca Monitoring Team | 23 December 2026 | 0040 GMT
Snapshot
Why Did Security Forces Execute Approximately 10,000 Civilians? The Securitisation Compliance Mechanism
Stage 1: Ontological Threat Construction (Pre-Election)
Stage 2: Institutional Authority Restructuring
Stage 3: Audience Acceptance Through Professional Socialisation
How Did Shadow Intelligence Structures Enable Industrial-Scale Killing Operations?
The Shadow State Architecture
Operational Evidence of Shadow Command
Massacre Execution Patterns
What Makes This Securitisation âSuccessfulâ When Others Fail?
Comparative Securitisation Analysis
Failed Securitisation: Kenya 2017 Election Crisis
Successful Securitisation: Tanzania 2025
Five Critical Success Factors
What Are the Warning Indicators for Future Mass Atrocity Events?
Early Warning Indicators from Tanzania Case
Institutional Indicators (12-36 months pre-crisis)
Rhetorical Indicators (3-6 months pre-crisis)
Operational Indicators (1-4 weeks pre-crisis)
Intelligence Assessment: Securitisation Theoryâs Predictive Capacity
Validated Theoretical Propositions
Critical Policy Implications
Synthesis and Strategic Conclusions
Snapshot
Tanzaniaâs approximately 10,000 deaths over three days represent successful securitisationâthe Copenhagen School process whereby political issues transform into existential security threats through speech acts, enabling extraordinary measures outside democratic constraints. This case reveals how TISS institutional destabilisation (four Directors General in three years) created authority vacuums permitting shadow command structures to execute industrial-scale violence through operationalised threat construction, demonstrating securitisationâs capacity to legitimise mass atrocity when audience acceptance, institutional capture, and information control converge.
Why Did Security Forces Execute Approximately 10,000 Civilians? The Securitisation Compliance Mechanism
The central analytical question isnât whether securitisation occurredâitâs how speech acts translated into approximately 10,000 individual killing decisions by thousands of security personnel over 72 hours.
The Compliance Cascade: From Rhetoric to Execution
Stage 1: Ontological Threat Construction (Pre-Election)
Securitisation theory posits that successful speech acts redefine target populationsâ existential status. Tanzaniaâs pre-massacre discourse achieved this through systematic categorical transformation:
January 2025: Opposition candidates framed as âthreats to stabilityâ during CCM primary bypass
October 1-28: 600+ detentions operationalised âcriminalâ designation before any violence occurred
October 29: Army chiefâs âcriminalsâ declaration completed ontological shiftâprotesters no longer citizens but threats requiring elimination
Critical Mechanism: This wasnât mere propaganda but juridical reclassification. Once designated âcriminalsâ disrupting elections, protesters lost civilian protection status under operational rules of engagement.
Stage 2: Institutional Authority Restructuring
The four TISS Directors General in three years wasnât bureaucratic turnoverâit was deliberate authority fragmentation creating operational ambiguity:
Traditional Command Structure (Pre-2021):
Director General issues operational directives
Chain of command accountability
Intelligence Act legal constraints
Five-year tenure stability
Fragmented Structure (2021-2025):
Directors General serve 5-13 months
Parallel authority from State House
Operational directives bypass formal hierarchy
Securitisation Implication: Authority fragmentation enables extraordinary measures by creating plausible deniabilityâoperatives follow âspecial directivesâ whilst formal leadership maintains distance from approximately 10,000 deaths.
Stage 3: Audience Acceptance Through Professional Socialisation
Copenhagen School emphasises securitisation requires audience acceptance. Tanzaniaâs security forces accepted mass killing directives through:
Professional Identity Reconfiguration:
Decade-long âWatu Wasiojulikanaâ operations (2015-2025) normalised extrajudicial killings
Systematic impunity for disappearances created expectation of consequence-free violence
Magufuli-era repression (2015-2021) established precedent for lethal force against opposition
Operational Socialisation Process: Pre-October 29th operations habituated security forces to:
Arbitrary detention without judicial process (600+ cases)
Abduction operations (Humphrey Polepole case, October 2025)
Torture of foreign nationals (Boniface Mwangi, Agather Atuhaire)
Evidence concealment protocols
Critical Insight: By October 29th, security forces had been professionally socialised to view opposition elimination as legitimate national security work, not criminal activity.
How Did Shadow Intelligence Structures Enable Industrial-Scale Killing Operations?
The ICC submissionâs allegation that operations were âpotentially directed by the presidentâs sonâ reveals securitisationâs institutional dimensionâparallel governance structures operating outside constitutional frameworks.
The Shadow State Architecture
Formal vs. Shadow Authority in TISS:
Formal Structure (Legal Framework):
Director General Selemani Mombo (appointed July 2024)
TISS Act 1996 authority
Parliamentary oversight (theoretical)
Constitutional constraints
Budget transparency requirements
Shadow Structure (Operational Reality):
State House direct command
Zero accountability mechanisms
Untraceable operational funding
Securitisation Mechanism: Shadow structures enable âemergency measuresâ by operating in legal grey zones where extraordinary violence becomes administratively invisible.
Operational Evidence of Shadow Command
Pre-Massacre Intelligence (JamiiForums, October 25):
320-person plainclothes deployment using unmarked Land Cruisersâthis unit operated outside:
Police Force hierarchy (Inspector-General Wambura)
TISS official structure (Director General Mombo)
Military chain of command (CDF Gen Mkunda)
Critical Question: Who commanded this unit? The operational signatureâplainclothes operatives, unmarked vehicles, pre-election deploymentâmatches historical âWatu Wasiojulikanaâ patterns attributed to shadow TISS structures.
Massacre Execution Patterns:
Evidence from Intelwatch ICC submission:
Sniper operations requiring specialised training
Coordinated multi-city simultaneous killing operations
Medical professionals threatened to suppress casualty data
Evidence concealment at industrial scale (800 bodies single morgue)
Operational Assessment: This level of coordination, specialisation, and evidence management indicates centralised command structure with:
Pre-planned operational protocols
Intelligence target acquisition systems
Logistics for multi-city simultaneous operations
Counter-forensics capabilities

