Ujasusi Blog

Ujasusi Blog

🔒 Securitisation Theory & Tanzania’s October 29th Massacres: Deconstructing the Architecture of State-Orchestrated Mass Killing

Evarist Chahali's avatar
Evarist Chahali
Jan 23, 2026
∙ Paid
A group of armed plain-clothed individuals aiming weapons from a white Toyota as gunfire is overheard. Source: TPE0051.

Ujasusi Blog’s East Afirca Monitoring Team | 23 December 2026 | 0040 GMT


  1. Snapshot

  2. Why Did Security Forces Execute Approximately 10,000 Civilians? The Securitisation Compliance Mechanism

    • Stage 1: Ontological Threat Construction (Pre-Election)

    • Stage 2: Institutional Authority Restructuring

    • Stage 3: Audience Acceptance Through Professional Socialisation

  3. How Did Shadow Intelligence Structures Enable Industrial-Scale Killing Operations?

    • The Shadow State Architecture

    • Operational Evidence of Shadow Command

    • Massacre Execution Patterns

  1. What Makes This Securitisation “Successful” When Others Fail?

    • Comparative Securitisation Analysis

    • Failed Securitisation: Kenya 2017 Election Crisis

    • Successful Securitisation: Tanzania 2025

    • Five Critical Success Factors

  2. What Are the Warning Indicators for Future Mass Atrocity Events?

    • Early Warning Indicators from Tanzania Case

    • Institutional Indicators (12-36 months pre-crisis)

    • Rhetorical Indicators (3-6 months pre-crisis)

    • Operational Indicators (1-4 weeks pre-crisis)

  3. Intelligence Assessment: Securitisation Theory’s Predictive Capacity

    • Validated Theoretical Propositions

    • Critical Policy Implications

    • Synthesis and Strategic Conclusions


Snapshot

Tanzania’s approximately 10,000 deaths over three days represent successful securitisation—the Copenhagen School process whereby political issues transform into existential security threats through speech acts, enabling extraordinary measures outside democratic constraints. This case reveals how TISS institutional destabilisation (four Directors General in three years) created authority vacuums permitting shadow command structures to execute industrial-scale violence through operationalised threat construction, demonstrating securitisation’s capacity to legitimise mass atrocity when audience acceptance, institutional capture, and information control converge.

Why Did Security Forces Execute Approximately 10,000 Civilians? The Securitisation Compliance Mechanism

The central analytical question isn’t whether securitisation occurred—it’s how speech acts translated into approximately 10,000 individual killing decisions by thousands of security personnel over 72 hours.

The Compliance Cascade: From Rhetoric to Execution

Stage 1: Ontological Threat Construction (Pre-Election)

Securitisation theory posits that successful speech acts redefine target populations’ existential status. Tanzania’s pre-massacre discourse achieved this through systematic categorical transformation:

  • January 2025: Opposition candidates framed as “threats to stability” during CCM primary bypass

  • October 1-28: 600+ detentions operationalised “criminal” designation before any violence occurred

  • October 29: Army chief’s “criminals” declaration completed ontological shift—protesters no longer citizens but threats requiring elimination

Critical Mechanism: This wasn’t mere propaganda but juridical reclassification. Once designated “criminals” disrupting elections, protesters lost civilian protection status under operational rules of engagement.

Stage 2: Institutional Authority Restructuring

The four TISS Directors General in three years wasn’t bureaucratic turnover—it was deliberate authority fragmentation creating operational ambiguity:

Traditional Command Structure (Pre-2021):

  • Director General issues operational directives

  • Chain of command accountability

  • Intelligence Act legal constraints

  • Five-year tenure stability

Fragmented Structure (2021-2025):

  • Directors General serve 5-13 months

  • Shadow command through Abdul Halim

  • Parallel authority from State House

  • Operational directives bypass formal hierarchy

Securitisation Implication: Authority fragmentation enables extraordinary measures by creating plausible deniability—operatives follow “special directives” whilst formal leadership maintains distance from approximately 10,000 deaths.

Stage 3: Audience Acceptance Through Professional Socialisation

Copenhagen School emphasises securitisation requires audience acceptance. Tanzania’s security forces accepted mass killing directives through:

Professional Identity Reconfiguration:

  • Decade-long “Watu Wasiojulikana” operations (2015-2025) normalised extrajudicial killings

  • Systematic impunity for disappearances created expectation of consequence-free violence

  • Magufuli-era repression (2015-2021) established precedent for lethal force against opposition

Operational Socialisation Process: Pre-October 29th operations habituated security forces to:

  • Arbitrary detention without judicial process (600+ cases)

  • Abduction operations (Humphrey Polepole case, October 2025)

  • Torture of foreign nationals (Boniface Mwangi, Agather Atuhaire)

  • Evidence concealment protocols

Critical Insight: By October 29th, security forces had been professionally socialised to view opposition elimination as legitimate national security work, not criminal activity.

How Did Shadow Intelligence Structures Enable Industrial-Scale Killing Operations?

The ICC submission’s allegation that operations were “potentially directed by the president’s son” reveals securitisation’s institutional dimension—parallel governance structures operating outside constitutional frameworks.

The Shadow State Architecture

Formal vs. Shadow Authority in TISS:

Formal Structure (Legal Framework):

  • Director General Selemani Mombo (appointed July 2024)

  • TISS Act 1996 authority

  • Parliamentary oversight (theoretical)

  • Constitutional constraints

  • Budget transparency requirements

Shadow Structure (Operational Reality):

  • Abdul Halim Hafidh Ameir de facto control

  • “Watu Wasiojulikana” special units

  • State House direct command

  • Zero accountability mechanisms

  • Untraceable operational funding

Securitisation Mechanism: Shadow structures enable “emergency measures” by operating in legal grey zones where extraordinary violence becomes administratively invisible.

Operational Evidence of Shadow Command

Pre-Massacre Intelligence (JamiiForums, October 25):

320-person plainclothes deployment using unmarked Land Cruisers—this unit operated outside:

  • Police Force hierarchy (Inspector-General Wambura)

  • TISS official structure (Director General Mombo)

  • Military chain of command (CDF Gen Mkunda)

Critical Question: Who commanded this unit? The operational signature—plainclothes operatives, unmarked vehicles, pre-election deployment—matches historical “Watu Wasiojulikana” patterns attributed to shadow TISS structures.

Massacre Execution Patterns:

Evidence from Intelwatch ICC submission:

  • Sniper operations requiring specialised training

  • Coordinated multi-city simultaneous killing operations

  • Medical professionals threatened to suppress casualty data

  • Evidence concealment at industrial scale (800 bodies single morgue)

Operational Assessment: This level of coordination, specialisation, and evidence management indicates centralised command structure with:

  • Pre-planned operational protocols

  • Intelligence target acquisition systems

  • Logistics for multi-city simultaneous operations

  • Counter-forensics capabilities

What Makes This Securitisation “Successful” When Others Fail?

This post is for paid subscribers

Already a paid subscriber? Sign in
© 2026 Evarist Chahali · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture