Learning lessons: improving counter terrorism
Training exercises
Counter terrorism exercises are a key part of training. Exercise SOCRATES, for instance, was a successful suicide bombing and marauding terrorist firearm attack simulation at Manchester Airport held just weeks before the Arena attack. When the Greater Manchester NHS Partnership Mass Casualty Plan had to be used, it was fresh in the minds of the exercise’s participants as a result of that simulation. Reviews of exercises must identify positive lessons such as these, as well as any necessary improvements. The Kerslake Review of 2018 into the preparedness for and response to the Manchester Arena attack found that problems with the call-out procedures through which support from the military is requested had been identified during exercises.
Sadly, these problems had not yet been solved, with the effect that when the Force Duty Officer phoned the military around twenty minutes after the bombing, he was put on hold for four minutes, diverting his attention from other urgent tasks. Simply identifying areas ripe for improvement is not enough: these improvements should be implemented as promptly as possible. When that doesn’t happen, explanations should be sought.
Weaknesses in communications and procedures delayed the Greater Manchester Fire and Rescue Service’s deployment to the Manchester Arena. The stretchers they had that were suited to the rapid extraction of casualties were not, therefore, immediately available, though Anderson is careful to note that it was not within the remit of his review to determine what difference this might have made. Questions should be asked about why these weaknesses weren’t identified and rectified after Exercise Winchester Accord, a counter-terrorism simulation at a shopping centre in Manchester in May 2016. This highlights the danger that lessons are not always identified when they should be, whether that be after an exercise or after an attack.
Resources
A particular challenge when considering how to improve the collection of intelligence is resources. Monitoring CCTV cameras, for instance, requires a great deal of manpower. As the case of Khuram Butt, one of the London Bridge attackers suggests, more resources can help prevent attacks. He was under active investigation as an SOI at the time, yet this did not expose the plans for the attack. This is not entirely surprising, as intelligence has its limits. It is not always the case that all the relevant intelligence needed to prevent an attack is collected. If it is collected, it must also be analysed, disseminated and acted upon in time. An MI5 officer told the June 2019 inquest for the London Bridge attack victims that despite its size, MI5 did not have the resources to have Butt under surveillance on the day of the attack. Yet at that point in time MI5’s work on SOIs and closed SOIs was already at an unprecedented level.
Resource constraints do not always frustrate intelligence work. Informers have been proved to be valuable. For instance, the extreme right-wing terrorist group National Action’s plot to kill MP Rosie Cooper was foiled by a whistleblower who turned against the group and passed information to Hope not Hate, who in turn passed it to the police. Informers act in this way at great risk to themselves, as their exposure as informers can lead to their deaths at the hands of those they inform on. Members of the community can also provide valuable intelligence, however, as was the case when Hisham Muhammad’s landlord reported seeing knives, a soldering iron and wires in his home. Muhammad has since been charged with engaging in conduct in preparation for acts of terrorism. Obtaining intelligence from the public in this way requires few resources, other than those invested in campaigns designed to encourage the public to provide this kind of information, such as Counter Terrorism Policing’s ‘Action Counters Terrorism’ (ACT).
Conclusion
Successful communication within and between organisations, well-planned training exercises, the timely sharing of intelligence, and access to sources of intelligence are just some of the diverse requirements for effective counter terrorism. They should also be evaluated, both by the organisations concerned and by independent reviewers. These evaluations should identify what has gone well in addition to what might be improved, and prompt efforts should be made to roll-out the required changes. However, while there may be times when criticisms of slow progress are justified, there may be others when expectations should be adjusted to become more realistic.
Pages
digital issue