WASU POST

WASU POST Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from WASU POST, News & Media Website, .

15/02/2024

Shout out to my newest followers! Excited to have you onboard! Francis Kuziwi, Clemence Munyeza, Stephen Nhidza, Douglas Mugutso, Patricia Netsai Tinoona, P*e WekwaChinouya, Caroline Mazenge, Charles Mukuni, Thawantah LittleBwoy Zihuu, Shalom Rore, BabaMunashe Chirewo, Tatenda Tom Chaka

09/08/2023

Polling station agents , vakadzidziswa here zvinodiwa!!!
1. pliz agent achange ari 1 mukati per every political candidate umwe ari panze vachichinjana kupinda mukati saka tapota usabuda uchisiya mukati musina umwe vekwako paunoenda ku toilet? kana kundodya?
2. Agent usapihwe chikafu nedrink or mineral water nevanhu usingaziwe FAZ planning to give yu water or drinks punched with spirits alcohol kuti pachaverengwa ma votes munenge madhakwa marara kuma kuma7 kwacho.
3. FAZ ndiyo ichange iri as police officers vazhinji vacho only one regular police ari kuiswa paPolling then other 2 awo maPolicon or FAZ saka don't trust mapurisa ari muUniform moti tiri covered be on yo own chenjerai mapere achauya sehwai.
4.FAZ is planning kuti maresults ePolling station akanamirwa vobva vabvisa ipapo ipapo , asi mutemo unoti anorara akanamirwa kuti kuseni vabereki vafume vachiona ma results avo.
5. V11 forms muno mirira mosigner mopihwa rekuenda naro asi for president panoitwa maB26 forms just take picture or results nekuti vanoramba navo at polling station level but capture yo polling results and forward to yo CCC party election command center per each province for data collation .
6. after closing polling station for votes counting all 3 agents mopinda mukati mutakure pen and note book pekunyora maresults as they counted musabude or kudzingwa.
7. Fons pakuverengwa kwema votes pachinge vanhu vapedza Fon inotenderwa kuve nayo mukati inorambidzwa chete vanhu vachiri ku voter paya asi makapusa zvenyu FAZ ichati hadzidiwe pakuverenga mukati apo ndipo Muswere ari kuda kubika Maths saka stand yo ground rakidzayi kuti munoziwa kwete kuzungaira.

handini ndadaro
04/04/2023

handini ndadaro

Mumwe nemumwe unebasa rekubvunza hama neshamwari kuti pa list apa ndezvipi zvawakawana zvakaitwa naED Mnangagwa neZanu PF. Mopawo varikumusha kunyanya waye vanoti ED pfeeeeee..gorighe richilootwa.

23/02/2023

2,009 Likes, 44 Comments - Hopewell Chin'ono () on Instagram: "Morgan Tsvangirai constantly reminded us what the issues were; 1. Corruption by a small elite in ZANUPF, 2. Capture of the Judiciary, 3. Breakdown of the Rule of Law, 5. Selective application of the law and more! Nothing has c...

23/02/2023

1,483 Likes, 42 Comments - Hopewell Chin'ono () on Instagram: "Whoever did this video should keep doing more! The is brilliant political communication that touches a person’s individual problems! I have always said political communication is about speaking to an individual about their t...

30/05/2022

Keith Silika: I HAVE previously gone on several drinking sprees with the former deputy director of the Central Intelligence Organisation (CIO), Menard Muzariri.

I was introduced to him by a mutual friend. When he knew that I was with the Police Protection Unit (PPU) and also from Mt Darwin, we hit it off! We partied in the usual night spots in Harare and Chitungwiza and he would occasionally summon me to go and look for women for him! One time we partied with some South African intelligence operatives whom he introduced to me. He never talked work and I would never dare ask him questions. At that time I was not aware of his role in the Gukurahundi democide. These experiences and other interactions with intelligence, forensics, and policing personnel whetted my curiosity in those fields.

The Zimbabwean state, since it came into being after independence from Britain in 1980, has been known for various democides which include political violence, crimes against humanity, state-sanctioned murder, violence and illegal mining atrocities.

The purpose of this opinion piece is to outline the contemporary state intelligence tactics, structure, resources and modus operandi in relation to murders and abductions in Zimbabwe. I will primarily focus on the CIO. The paper will also elucidate some of the actions and profiles of other perpetrators such as the Zimbabwe National Army (ZNA), Zimbabwe Republic Police (ZRP), War Veterans (WV) and Zanu PF Youth Wing (YW).

The present CIO, formerly the Special Branch, came into being in 1981 and was headed by Ken Flower until his retirement in 1984. The Special Branch was responsible to the Deputy Commissioner (Crime and Security prior to its incorporation into the President’s Office). The present CIO boss is Isaac Moyo and is deputised by Brigadier-General Walter Tapfumaneyi and former National University of Science and Technology Pro-Vice-Chancellor Gatsha Mazithulela. Between the two of them they supervise various key branches—such as internal, external, counter-intelligence, military intelligence, training, close protection unit, technical, training, administration and another simply known as Branch Six. In addition, there are desks on social media, trade unions, projects, terrorism, and propaganda.

There are currently around 3 500 full-time staff and around 2 000 part-time “assets” deployed mostly in Zimbabwe. There are also operatives in most African countries and in Europe. In terms of locations where they operate from, a decade ago SW Radio Africa published a credible list which is found here. In addition to these locations like most intelligence agencies around the world, the CIO has safe houses and farms dotted around the country. As readers might be aware, Zimbabwe was listed as one of the countries which the CIA used for renditions. This is the abduction and torture of suspects by the CIA carried out in other countries with permission.

Before discussing the shenanigans of the Zimbabwe intelligence service, let us discuss briefly how a professional service like this should function. Firstly, it should not be based in the Office of the President for obvious reasons such as bias, corruption, misuse and manipulation. Hallmarks of the present CIO. The purpose of a professional intelligence service is to gather intelligence, manage information, work on evidence and disclosure, and support other security services. In Zimbabwe, as this paper will demonstrate, the CIO literally serves at the pleasure of the President. However, I must admit not all intelligence services are 100% professional, the extent to which they are dubious is the problem in Zimbabwe.

Now readers might want to know what intelligence is. The CIA (1999), defines intelligence as knowledge and foreknowledge of an individual’s or entity’s surroundings used for present and future decision making and action. Intelligence can also be viewed as actions or processes used to produce knowledge. Global Intelligence Working Group (2003) defines law enforcement intelligence as the acquisition and analysis of information to produce intelligence which can be used for decision making.

There are plenty of examples within Zimbabwean contexts that can be used to illustrate some of these definitions. Take the Catholic Church’s former archbishop of Bulawayo province, Pius Ncube. The CIO had information that, despite his being a devout priest, he had a weakness for the ladies. They had this information for years and were waiting for the right opportunity to use that information (intelligence) to shut his anti-Mugabe stance down. And they used that, albeit successfully, I should say. Readers can think of dozens of other examples of such successful use of information, particularly against politically connected individuals. Remember former Vice-President Joice Mujuru previously mentioning that Mugabe has files on everyone. This is the kind of information that they have.

So how is intelligence of ordinary citizens collected by the CIO? This is done covertly, overtly, through social media, some of it comes through the ZRP, ZNA and paid informers. Covert intelligence is information gathered through undercover, technical surveillance, and pseudo operations. Zimbabwean CIO operatives like being known and most of them are not exactly discreet. There are various videos of human rights defenders (HRD) who have been followed by operatives and subsequently filmed them.

The Namatai Kwekweza video is one such example. The purpose of such aggressive form of surveillance is to intimidate and to distract the individual. What sort of intelligence or information does the CIO collect? Well, they note everything from shoe size, clothing, friends, family drinking habits, sporting activities, vehicles used, work, addresses and, in some extreme cases, they can collect DNA. This information is often fed into a software system, analysed, rated for use, or marinated. Marination is when any useful information is kept for future use.

Let me give you a practical example below on how that information looks like presently. Previously, intelligence was kept on index cards which took ages to search and input intelligence.

Let us cite the example of well-known journalist Hopewell Chin’ono. What does his profile look like on their system? Here is an example:

Pictures Addresses Associates Vehicle Crimes Intelligence and Operations
Schematic of CIO intelligence system.

Each of the above tabs will be interactive and when you click on them they will show you further contents associated with an individual. In addition, as you go from left to right, depending on operational level of clearance, one will not be able to see certain information. The intelligence section is the most populated as it will contain detailed descriptive intelligence on an individual. For high-profile individuals, there might be daily updates or intelligence. If there is a high level of intelligence from multiple sources, this will force the analyst to make actionable decisions. This can be either an arrest, abduction, warning or assault etc. So what do most intelligent notes look like? Here is an example:

On 05/10/2020 Chin’ono was seen in the company of Jacob Ngarivhume at Belgravia shops at approx. 3pm. Hopewell was wearing blue jeans, grey t shirt and black shoes. Jacob was wearing blue trousers, grey shirt, and white trainers. The long range listening device was not working hence could not hear conversation. Both individuals stayed at the shops for approximately 2 hours and left in their respective vehicles which are already on file

When this information has been sent, it then becomes rated according to the source of information, intelligence evaluation, information content, and risk assessment. Also, as demonstrated information is easily falsified, politicised, and accepted. If you look at the history of all opposition leaders from Joshua Nkomo to Nelson Chamisa, most of the intelligence gathered against them is false and grossly exaggerated. Recent statements by security Minister Owen Ncube about Operation Light House is one such example.

If the intelligence is correct and further investigation were done, why then not arrest the individuals in question or mount an operation? In Zimbabwean contexts, detailed surveillance of individuals is limited to high-profile individuals found in opposition and human rights groups. Surveillance of Nelson Chamisa, for example, will be in technological terms and the use of operatives. Technological devices can be planted on vehicles, associates and can be unwittingly downloaded via clips in chat groups/social media which have a worm. I had the privilege of working at the US embassy in Harare during my PPU days. They sweep their vehicles for devices every single day. The devices used to check are readily available and some can be found here.

In terms of overt surveillance, operatives will normally be a six-men team, the two advance party (AP), static team (ST), and direct observation (DO) team. The DO team are the ones observable and have been reported numerous occasions by individuals being followed in Zimbabwe. The ST are static and normally are on the peripheral edges of a target. The AP team are the ones who know the route normally taken by a target and can be used often to intercept. The Sanderson Makombe incident can give you a loose indication on how the teams worked in the incident that ended up in two people dying. For “minor” individuals, the surveillance team will be smaller; as you can see, it is very expensive due to the number of people and resources involved.

Another important source of intelligence in contemporary contexts is social media and the hacking of phones. The CIO has a dedicated cyber unit which carries out offensive and defensive operations on selected targets. They have additional access to the military intelligence (MI) unit based at Mt Hampden as reported by Professor Jonathan Moyo. There are myths associated with what they can reasonably do or perform. They cannot hack your WhatsApp as it has end-to-end encryption. However, messages can be read before they are encrypted or after they are decrypted. That means any spyware dropped on the phone by an attacker could read the messages. Edward Snowdon encourages people to use other apps such as Signal. In addition, all companies and individuals who have local server emails are easily hacked. I remember telling Paston Dzamara about his email which he later changed. To demonstrate this, we can look at the Baba Jukwa investigation which led the then assistant police commissioner Crispen Makedenge nowhere.

Even Facebook messages are safe unless, of course, you have unwittingly downloaded spyware on your phone from a WhatsApp group, in which case they can read and see everything. In addition, unless you are a targeted individual, they do not have the capacity and personnel to carry out analysis of millions of people like what China does, for example. In terms of internet, the Tor browser is useful if you want to circumvent the prying eyes of the CIO. I am aware that Prof Moyo is currently banging on about the Mt Hampden listening centre which is apparently being manned by Group Captain Peacemaker Credo Kereke. However, as demonstrated previously, the CIO has not been able to effectively utilise those tools as they currently rely on abduction and the physical examination of devices. Readers might be reminded that big companies such as Facebook and Apple will not even supply information to the FBI.

Lastly, let us move on to the abduction and torture of individuals by the CIO. What is the plan, what do they do, and where do they take them? Since 2000, there has been more than 5 000 abductions by the state and associated organs.

Each respective state apparatus has an associated signature. However, I am going to focus on the CIO. The purpose of abduction is normally to scare, disable, or elicit information that otherwise was not obtained during normal surveillance methods, as discussed previously. Before an abduction takes place, intelligence is synthesised and an operation order is issued by a senior intelligence officer.

This order will contain information such as purpose, personnel, location, target, resources, risk assessment, and tactics. In addition, there will be trigger plans—these are the processes to implement in case something goes wrong. If we cite the example of Itai Dzamara, these processes were in place when he was abducted on 9 March 2015. I spoke to the late Patson Dzamara at that time a few weeks after Itai’s abduction and suggested they apply for mobile phone triangulation of his phone, but I believe the idea was shot down by the police. Itai’s mobile phone would have indicated who was travelling with him and where he was taken if the phone was on.

This I also strongly suggested in the Tawanda Muchehiwa abduction as the perpetrators used his phone to lure other victims. The nearest mobile phone mast to that location has details of individuals who were close to him. This is dependent on their mobiles being on. The state is aware what exactly happened as they have obfuscated the information at every turn. My theory on Itai Dzamara is that something went wrong during the abduction and torture, resulting in the officers in question implementing the trigger plan.

Let us discuss abductions using Harare as a snapshot in order to unpack tactics and locations. The way the CIO abduct, torture and leave individuals either dead or alive has explanations within psychological and criminological contexts and I have identified certain concepts. Routine activities theory (RAT), presupposes that for an offence to occur, three elements need to be present. That is, a motivated offender (CIO), suitable victim (human rights defender), and the absence of a capable guardian (ZRP). The optimal foraging theory (OFT) can be used as a theoretical framework for applying abduction site prediction modeling to aid in locating the missing. This will be illustrated briefly in the next section.

Offender profiling is guarded by two significant assumptions, consistency and homology theory. The consistency assumption suggests that perpetrators often repeat offences in an analogous fashion. This can partly explain the methods of various state entities in the massacres and abductions that have taken place in Zimbabwe. The 5 Brigade, for instance, were very consistent in their methodologies in searching, detaining and killing of people in Matabeleland.

The homology theory proposes that the way an offence is committed is related to background characteristics of the perpetrator (The more training, resources, time the offender has the greater the opportunities and severity of torture). We can use the Jestina Mukoko abduction as an example within that context. This can be explained in other various signature kidnappings by either MI, the Ferret Team/s or War Veterans.

Let us discuss these aspects using the dozens of abductions that have taken place in Harare in the last few years. If we look at the abductions of Jestina Mukoko, Patson Dzamara, Joana Madamombe, Peter Mugombeyi, Samantha Kureya, to name but a few, a pattern emerges. The location of torture and subsequent release are within an hour of Harare and include: Beatrice farming area, Mt Hampden (near Cyber Centre), Mazowe, Bindura, Seke/Dema junctions, Snake Park, Nyabira, Nharira Hills and Lake Chivero. Anyone can actually map this (I have a map!). The operatives are operating within their comfort zone in an analogous fashion. They also have a stand down area nearby and are familiar with the area. Now that the cat is slightly out of the bag, they might change tact! In forensic contexts there might be still a wealth of information which is available in these locations.

Another aspect with regards abductions of civilians in Zimbabwe is the issue of injection of unknown substances by the CIO. Examples of people who have been subjected to such methods include Job Sikhala and Mugombeyi. The CIO inherited personnel and equipment used by the Special Branch and other Rhodesian forces. As reported by Cross in Rhodesia and Chemical Biological Warfare 1975-1980, Zimbabwe had a chemical warfare unit which poisoned thousands of guerrillas in the liberation war. Curiously, if you look at the press release in the appointment of deputy director of the CIO, Dr Mazithulela, it states that he is the chairman of the National Authority on Chemical Weapons Convention! Now why is Zimbabwe in the convention and what chemical weapons do we have? So what substances are being injected into detainees? We know the CIA, the rendition colleagues of the CIO, use Scopolamine aka “Truth Serum”. Other substances are sodium thiopental and phenobarbital. If any of the barbiturates were administered to Joana Mamombe, for example, it might explain her present physical and mental health. People metabolise and respond differently to certain drugs.

In concluding this piece, it is important for human rights defenders and other victim groups to implement community safety and abduction prevention/mitigation measures. These can be found in countering some of the activities elucidated above. Examples is the use of smart bracelets and registering on the Sentinel project for satellite tracking. These are all legal and can be found in technological, psychological and simple security measures. So those concerned should data capture low-hanging fruits such as vehicles used, names published, and locations. There are also opportunities on the technological fronts in the phone of cleaning devices and use of virtual private networks (VPNs) as alert tool, using social media and a bit of journalistic work as demonstrated by Chin’ono.

Peace.

About the writer: Silika, based in the United Kingdom, is a former policeman in Zimbabwe and has a PhD in Forensic Archaeology

28/05/2022
27/03/2022

Today Journalist Hopewell chin'ono is celebrating his 51st birthday.

Hopewell is known for his works as a journalist in exposing corruption.

He is a multi-award winning journalist

Hopewell chin'ono holds a big number of times he was arrested by police for carrying out his work. 2021 marked the year he was arrested 3 times within a period of six months.

Hopewell is honoured in Zimbabwe for his prowess in "Investigative journalism"

He is one of the journalist with big academic qualifications throughout his career in journalism.

He is also one of the richest journalist in Zimbabwe but he still stands with the sabaltern class.

Chembere dzepa ma tee apo ward 6 represented
20/03/2022

Chembere dzepa ma tee apo ward 6 represented

20/03/2022
08/03/2022

This is a cancer radiotherapy machine.
It costs US$2 million to buy.

Zimbabwe does NOT have a single working cancer machine in ALL its public hospitals.

If an ordinary Zimbabwean needs cancer treatment today, they will die.

ZANUPF political elites smuggle Gold worth US$150 million every month.

Gold LOOTED by ZANUPF elites every month would buy 75 of these machines.

So anyone dying today from cancer because they can’t get radiotherapy is a victim of ZANUPF thievery!

08/03/2022

The net is closing

11/02/2022

SEVEN PRINCIPLES OF EAGLES ....

PRINCIPLE 1
Eagles fly alone at high altitude and not with sparrows or other small birds. No other bird can get to the height of the eagle. Stay away from sparrows and ravens. Eagles fly with Eagles

PRINCIPLE 2
Eagles have strong vision. They have the ability to focus on something up to five kilometers away. When an eagle sites his prey, he narrows his focus on it and set out to get it. No matter the obstacles, the eagle will not move his focus from the prey until he grabs it.

Have a vision and remain focused no matter what the obstacle and you will succeed.

PRINCIPLE 3
Eagles do not eat dead things. They feed only on fresh prey. Vultures eat dead animals, but eagles will not.

Be careful with what you feed your eyes and ears with, especially in movies and on TV. Steer clear of outdated and old information. Always do your research well.

PRINCIPLE 4
Eagles love the storm. When clouds gather, the eagles get excited. The eagle uses the storm’s wind to lift it higher. Once it finds the wind of the storm, the eagles uses the raging storm to lift him above the clouds. This gives the eagle an opportunity to glide and rest its wings. In the meantime, all the other birds hide in the leaves and branches of the trees.

We can use the storms of life to rise to greater heights. Achievers relish challenges and use them profitably.

PRINCIPLE 5
The Eagle tests before it trusts. When a female eagle meets a male and they want to mate, she flies down to earth with the male pursuing her and she picks a twig. She flies back into the air with the male pursuing her.

Once she has reached a height high enough for her, she lets the twig fall to the ground and watches it as it falls. The male chases after the twig. The faster it falls, the faster he chases it. He has to catch it before it falls to the ground. He then brings it back to the female eagle.

The female eagle grabs the twig and flies to a higher altitude and then drops the twig for the male to chase. This goes on for hours, with the height increasing until the female eagle is assured that the male eagle has mastered the art of catching the twig which shows commitment. Then and only then, will she allow him to mate with her.

Whether in private life or in business, one should test commitment of people intended for partnership.

PRINCIPLE 6
When ready to lay eggs, the female and male eagle identify a place very high on a cliff where no predators can reach. The male flies to earth and picks thorns and lays them on the crevice of the cliff, then flies to earth again to collect twigs which he lays in the intended nest. He flies back to earth and picks thorns laying them on top of the twigs. He flies back to earth and picks soft grass to cover the thorns. When this first layering is complete the male eagle runs back to earth and picks more thorns, lays them on the nest; runs back to get grass it on top of the thorns, then plucks his feathers to complete the nest. The thorns on the outside of the nest protect it from possible intruders. Both male and female eagles participate in raising the eagle family. She lays the eggs and protects them; he builds the nest and hunts. During the time of training the young ones to fly, the mother eagle throws the eaglets out of the nest. Because they are scared, they jump into the nest again.

Next, she throws them out and then takes off the soft layers of the nest, leaving the thorns bare When the scared eaglets again jump into the nest, they are pricked by thorns. Shrieking and bleeding they jump out again this time wondering why the mother and father who love them so much are torturing them. Next, mother eagle pushes them off the cliff into the air. As they shriek in fear, father eagle flies out and catches them up on his back before they fall and brings them back to the cliff. This goes on for sometime until they start flapping their wings. They get excited at this new found knowledge that they can fly.

The preparation of the nest teaches us to prepare for changes; The preparation for the family teaches us that active participation of both partners leads to success; The being pricked by the thorns tells us that sometimes being too comfortable where we are may result into our not experiencing life, not progressing and not learning at all. The thorns of life come to teach us that we need to grow, get out of the nest and live on. We may not know it but the seemingly comfortable and safe haven may have thorns.

The people who love us do not let us languish in sloth but push us hard to grow and prosper. Even in their seemingly bad actions they have good intentions for us.

PRINCIPLE 7
When an Eagle grows old, his feathers become weak and cannot take him as fast as he should. When he feels weak and about to die, he retires to a place far away in the rocks. While there, he plucks out every feather on his body until he is completely bare. He stays in this hiding place until he has grown new feathers, then he can come out.

We occasionally need to shed off old habits items that burden us without adding to our lives.

- Footprint TV

21/12/2021

Merry Christmas and a Happy New to the Zimbabwe Anti-Corruption Commission

28/11/2021

MDC Alliance Masvingo Youth: We announce the passing on of Nyasha Zhambe who was abducted during the tour of Pres Advocate Nelson Chamisa in Masvingo. He was severely beaten by ZANU PF UK thugs led by Baster Mafio, Joe Mudziwapasi, Sinikiwe Maireva in Gutu. Attached is the Pic of Baster Mafio

18/10/2021

Wemutemo wopwanya mutemo

09/10/2021

Appeal and reopen the Zimbabwe "Drax" Covid Case w/ a Independant Special Prosecutor

14/08/2021
10/05/2021
19/01/2021

19/01/2020

*_The Wasu Post in it’s bid to help fight the spread of COVID 19 pandemic saw this as an IMPORTANT PUBLIC NOTICE and had to bring it to your attention._*

City of Mutare in collaboration with the Ministry of Health and Child Care has started rolling out free *COVID 19 testing sites* in the City to assist the public in knowing their status.
The Centres that have been established are as follows.

1.Mutare Hall( Queens Hall)
2.Sakubva Beit Hall
3.Dangamvura Beit Hall.

Testing being done Monday to Friday from 9 am to 3 pm. Results are given after 15 minutes on site.
Go and get tested for COVID 19

The Wasu Post is broadcasting news to people in its data base. If you want to stop
receiving the news send “STOP” to +447858706862. If you want to receive our news bulletin send the word “SUBSCRIBE” to +447858706862. If you want to share news with us send them to +447858706862. If you want to advertise with us send your adverts to +447858706862. Email us on [email protected]

18/01/2021

Ambassador Mutambikwa Joins Manicaland In Consoling Gwaradzimba Family.*

Ishmael Makoni

MUTARE- While the province is still to come to terms with the deaths of Mutare City Council Town Clerk Joshua Maligwa and Africa University Vice Chancellor Professor Munashe Furusa we have been robbed of another industrious woman Dr Ellen Gwaradzimba.

The Editor and staff of The Wasu Post joins the rest of Manicaland in consoling the families of the deceased comrades.

Meanwhile City of Mutare Brand ambassador Mr Jairos Mutambikwa sent his condolence message to the family of Dr Gwaradzimba.

_Greetings to you all, the business community, Mutare residents, all stakeholders at large. It has been a painful start in 2021, having lost Town Clerk Mr Joshua Maligwa, Africa University Vice Chancellor Proffessor Munashe Furusa.

In the midst of mourning, we have been plunged again into mourning, our revered, Minister of State for Provincial Affairs and Devolution Dr. Ellen Gwaradzimba has also been taken away from us.

Firstly allow me to express my sincere condolences to the bereaved families and encourage the Mutare and Manicaland Community at large to put trust in the Lord. We have been dealt a severe blow we are down but not out and we believe the Lord allowed it for a reason. The demise of our beloved Hon Dr Ellen Gwaradzimba better known as (Auntie Gwaa) has really been a bitter pill to swallow. Indeed we have lost key pillars in the development matrix of our City and Province at large. Lets have faith in God and knowing that we are all destined to take the same route when the father calls us home .

To Auntie Gwaaa we say Go Well Our Heroine, we shall forever cherish the good works.

We will greatly miss you as Mutare and Province at Large.

Address


Website

Alerts

Be the first to know and let us send you an email when WASU POST posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to WASU POST:

Videos

Shortcuts

  • Address
  • Alerts
  • Contact The Business
  • Videos
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share