You are here: HomeOpinionsArticles2017 06 05Article 544697

Opinions of Monday, 5 June 2017

Columnist: Nana Owusu-Sekyere

What Ghana can learn from the UK terrorist attacks

File Photo File Photo

1. The Response Time and Preparedness of The Security Agencies.

In the case of the London bridge attack, for the security agencies and emergency unit to reach the crime scene and subdue all three terrorist in 8minutes is commendable.

This efficiency undescored their preparedness and an understanding of their mandate in times of national crises.

2. Speed And Depth Of Investigation.

In all the three terrorist attacks, though investigations are ongoing, in less than 12 hours, the perpetrators were identified and investigators aggressively expanded their work to identify immediate associates both home and abroad.

Investigators were able to build a clear narrative of what happened and informed citizens thereby drawing support from them.

And where necessary information was shared immediately with partners both local and international.

3. National Solidarity

This is where citizens come together undivided to fight a common goal and help in investigation by providing relevant information leading to the identification of suspects and perpetrators.

Perhaps this is more key to the rapid evolution of the different angles of the attack.

4. Rapid Reforms Tabled And Programs Initiated.

On each occasion when terrorist have struck, "COBRA" meetings, or "COBR" meetings (Cabinet Office Briefing Room A) were convened in tandem with the activities of investigators to get to grips with the issue at hand and initiated reforms/ policies to immediately upscale security challenges.

"Cobra" meetings are emergency meetings to signal issues of national significance . It also opens a chapter of uniquely finding a solution to a particular attack.

5. Modus Operandi ( MO)

Terrorists are never short of options and so must our security not be short of options. Their sophistication is in their low key approach. This is rightly so to avoid detection. We must position ourselves in this regard by infiltrating their network and anticipate their move on a daily basis .

Nana Owusu-Sekyere

Security Analyst