Header Ads

The Tuareg Woman

The Tuaregs society is structured around the woman. In the marital institution, it plays the central role, from marriage to the education of children and the management of the home. The Tuareg woman is at the center of all decisions. She is the support on which rests the whole economic life and the future of the community. She proposes the alternatives, manages and frames the encampment to the absence of the man and participates in all the decision in his presence.She is the pride of her brothers and all her family. She is also respected by all men in general. It is in Tuareg society that women are truly regarded as the mother of humanity with complete rights. Moreover, the desert ladies are famous for their beauty and their musical talent; when they give concerts, men run from the most distant points, dressed like ostrich males. The women of the Berber tribes sing every evening by accompanying themselves with Imzad and tambours.

    The Tuareg woman has access to property, freedom, to express herself and to choose one's partner and to be free from bodily harm. To preserve the cultural foundation of this society, a code of conduct known as "Asshak" was instituted and imposed on men. In this moral ethical approach, man must manage his physical advantage so as not to abuse it on the woman and the weak in the society. This rule guarantees the totality of the rights of women. The man who derogates from this rule is no longer noble and is deprived of his rights. It is the women who pronounce this exclusion.

    Before joining her husband, the Tuareg wife has always had a tent, furniture and livestock according to the capacities of her parents. She joins her husband with a capital that he must preserve and grow in agreement with her. The Tuareg woman not only has the right to property, but everything that materializes the family unit belongs to her, starting with the tent and its contents. In the case of separation, it is the man who leaves the home (tent).  

     The Tuareg man knows his mother and the mother of his mother, but ignores his father. The child belongs to the woman and not to the husband. It is the blood of the wife and not that of her husband which confers on the child the rank to be taken in the tribe and in the family. Thus, only feminine descent is retained. The notion of "father" is secondary in their traditional narratives. The Tuareg tribes all claim great legendary women-ancestors. In the Saharawi culture, there is no difference between girls and boys in childhood.

  Sahrawi women also play an active role in their political struggle. In Saharawi land, according to the old tradition, women hold the highest responsibilities. They may be ministers or ambassadors .The Tuareg woman is monogamous; she has imposed monogamy on her husband, although the Muslim law allows him several women. She is independent with regard to her husband, whom she can repudiate under the lightest pretext; she comes and goes freely. She excels in the exercises of the body; on the back of a dromedary ,she crossed a hundred miles to go to a party, it supports races with the boldest horsemen of the desert…

In most Muslim cultures, a divorced woman becomes a pariah. But in Saharawi culture, it is at the same time more respected than a single virgin, and more seductive.

      The Tuareg image that the woman is the central pillar of the tent, tamenkayt, testifies to her role as a stable and stabilizing element (Claudot-Hawad, 1989). This representation of the Tuareg woman is reflected in ethnological studies, not to mention the various writings of travelers where the position of women in the Tuaregs is always considered exceptional. Man, for his part, must nourish and protect the person who, through his role as a social breeder, perpetuates his society: it is only through him that he can ensure the "prolongation of herself" (Claudot-Hawad And Hawad, 1987). As a result, men fight outside against any being or element that may challenge this order of things. Their honor depends on their ability to return victorious either from a battle or from a stay in the essuf, the void surrounding their tents that they are trying to domesticate a little more each day.

written by ARAB Sabrina


  1. “Code Trading System’’ method makes me trade well in oil trading, I can assure you this. You can see daily records of their trades in the website. For more information Google Code Trading System.

  2. 📁 HIRE A PROFESSIONAL HACKER today has been one of the world's most technical valued navigating information.
    On (Recovery Of Lost Funds, Catching A Cheating Spouse [Phone Hack], Credit Score Upgrade, WEBSITE HACK.)
    High prolific information and Priviledges comes rare as it's been understood that what people do not see, they will never know. One of the affirmative ability to convey a profitable information Systematically is the majoy factor to success
    When you wonder “which hacking company should I hire, the first aspect that should concern you is Sincerity. The very sincerity of a company's strength earns them a solid reverence in their field of concentration. Secondly, Rapid response. Clearly, you want to embark for services that povides swift response, Thanks to our talented and astonishing Hackers, you will be glad to find out that our services Implies precisions and actions.
    This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
    Welcome to the Global KOS hacking agency where every request on hacking related issues are fixed within a short period of time.
    The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers.
    If your shoe fits in any of the services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
    Providing value added services to clients as a hacker has been our sustaining goal.
    Are you faced with cyber challenges like
    💰Recovery of lost funds:✅(BITCOIN INVESTMENTS, BINARY OPTIONS, LOAN AND TRADING FOREX WITH FORGERY BROKERS.) 🖥️I would try my possible best to shortly explain this in particular.
    This shocking study points to one harsh reality we all face today. It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database. Every information required by the Global KOS would be used to tracking every transaction, time and location of the scammer. This is acheived using the systematic courier tracking base method•
    However, there are secret cyber infiltrators called brokers and doom. The particular system used by this scammers permeates them to manupulate targets digital trading system or monetary fund based accounts. Strictly using a dark web rob to diverting successful trades into a negative outcome. This process bends to thier advantage while investors results to losing massive amount of money. An act of gaining access to an organization or databased system to cause damages. We have worked so hard to ensure our services gives you a 100% trading success to recover all your losses•
    📲 HACKING A MOBILE PHONE:.✅ Do you think you are being cheated on? Curious to know what your lover is up to online? This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
    The company is large enough to provide comprehensive range of services such as•
    • Email hacks📲
    • Hacking of websites.📲
    • Uber free payment hacks.📲
    • website hack.📲
    Our strength is based on the ability to help fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
    ✉️Email: leroysteckler(@)gmail • com
    Or theglobalkos(@)gmail.com
    ®Global KOS™


Powered by Blogger.