GET /api/v0.1/hansard/entries/1277277/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 1277277,
"url": "https://info.mzalendo.com/api/v0.1/hansard/entries/1277277/?format=api",
"text_counter": 222,
"type": "speech",
"speaker_name": "Kiminini, DAP-K",
"speaker_title": "Hon. Bisau Kakai",
"speaker": null,
"content": " Thank you, Hon. Speaker. I am sitting here, and listening at the way the two cabinet secretaries are answering these questions. First of all, we have to remember that on that particular day, our country was under attack. In fact, we thank you for coming together, because now you give an impression that at least you are coordinating issues. Before that, we thought you were not at all. The Cabinet Secretary for Interior and National Administration talked about it happening on the first day, but they investigated on the second day and the third day. That shows a lot of laxity. We cannot have a situation where we are under attack for three days, and we say we are investigating the matter. Technology is moving at a very fast pace. This is neither the first time nor will it be the last time such an attack will happen. We are going to have more attacks. I want the Cabinet Secretaries to tell us the mitigation measures they have put in place so that when we have another technological attack, we ensure that Kenyans do not suffer. Remember, those affected most were those under the pyramid because they were given tokens. Let the Cabinet Secretaries tell us what they will put in place to mitigate the problem. Lastly, I would like the perpetrators of the attack to be named publicly and their names tabled here. Thank you."
}