Risk management in Africa

September 2004 Security Services & Risk Management

Nowadays the threat of terrorism is at an all time high. While some parts of the world, eg, Israel, Palestine and Iraq, are affected almost on a daily basis by acts of terror, the reality is that modern terrorists, in spite of the preventative efforts by law enforcement and intelligence agencies, have the network and capabilities to strike anywhere in the world as they deem necessary.

The risk of being involved in a terrorist attack in an African country is still very small, like most other risks of travel such as hijackings and natural disasters. However, there are countries that have already experienced serious acts of terror and are often listed by governments as potential targets for further attacks. These include Kenya, Tanzania and various North African countries such as Morocco, Tunisia and Egypt. Algeria has experienced high levels of terrorism due to an on going conflict between the government and extremist groups opposing it. Foreigners have often been victimised.

Acts of terrorism

A number of terrorist attacks provide tragic evidence that the African continent also suffers from terrorism committed by both indigenous, insurgent groups that use terrorist tactics and international terrorist groups. Some of the worst terrorist attacks that were carried out in Africa include:

* The same-day bombing of American embassies in Kenya and Tanzania in 1998 that killed over 200 civilians.

* A suicide car-bomb against a synagogue in Djerba (Tunisia) in April 2002 that killed 18 European tourists and local Tunisians.

* Simultaneous attacks against a commercial airliner and a hotel in November 2002 in Mombasa (Kenya) that killed 17 Kenyans and Israelis.

* Suicide attacks in Casablanca (Morocco) in May 2003 against a restaurant and a hotel frequented by Westerners that killed over 40 civilians.

The threat ahead

Recent intelligence reports indicated that, in view of the fact that al Qaeda's terrorists have been losing sanctuaries elsewhere in the world, they may be looking to the deserts and jungles of Africa as a haven where terrorists could train recruits and plan new attacks. As an example, although Sudan entered into constructive dialogue with the African Union and other international bodies on counter-terrorism efforts, the reality is that its territory continued to be used as a safe haven by members of various groups, including al Qaeda, Egyptian al-Gama'a al-Islamiyya, Egyptian and Palestine Islamic Jihad, and Hamas. Most groups used Sudan primarily as a secure base for assisting compatriots elsewhere. Furthermore, despite attempts on the part of most African governments and the African Union to enhance counter-terrorism efforts through a soon-to-be centre in Algiers, the reality is that conditions that make many countries in Africa desirable locations for terrorists still persist. These include a shortage of financial and technical resources, areas of instability and prolonged violence, corruption, weak judicial and financial regulatory systems, porous borders and unregulated coastlines facilitating the movement of persons and illicit goods.

Threat reduction strategies

The result of the above situation is that foreign businesses, expatriates and travellers can be potential victims of future terrorist attacks in Africa. This implies that companies and organisations should do their utmost to protect their human and material resources against the threat of terrorism.

Many terrorist attacks show that terrorists are prepared to strike at the least protected 'Western' interests. People travelling abroad need to be aware of the risk of indiscriminate attacks in public places. They should be vigilant, take the necessary precautions, be aware of local sensibilities, monitor the media and check travel advices for the country they live in or plan to visit.

Recent terrorist attacks on Westerners appear to have involved extensive planning and preparation and were likely preceded by extensive pre-attack surveillance. Often, this pre-attack surveillance can be detected.

Be aware of your surroundings. Take note of vehicles or individuals that do not appear to belong in the area and immediately report them to the authorities.

Vary your times and routes to and from destinations. Whenever possible, do not have a set day for shopping, errands and personal needs. Be unpredictable in your work and social schedules, unpredictable targets are hard targets.

Maintain a low personal profile by avoiding actions that may draw attention to yourself. Keep your colleagues and family aware of your daily plans and ensure that they know how to reach you.

If possible, do not schedule regular meetings at either the start or end of the day. Arrival and departure times from home to office can become unacceptably predictable if employees must schedule their commute around regularly scheduled meetings.

Choose restaurants that are recommended by the hotel or a trusted person, but keep away from sites frequented by police, military personnel or a noticeable presence of Westerners (often the preferred target for terrorists). Do not sit at sidewalk tables or near windows. Choose a table where you can easily view individuals entering the restaurant and be in a position to evacuate quickly if necessary.

Try to minimise the time spent in a public area of an airport, which is a less protected area. Proceed to the restricted area beyond passport control. On arrival, leave the airport as soon as possible.

Elio Zannoni is a specialist in crime risk factors and reduction strategies. He can be contacted at International Threat Analysis, a specialist, international risk consultancy involved in the intelligence, analysis and management of security related threats, on 083 460 5990 or e-mail [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visualise and mitigate cyber risks
Security Services & Risk Management
SecurityHQ announced its risk and incident management capabilities for the SHQ response platform. The SHQ Response Platform acts as the emergency room, and the risk centre provides the wellness hub for all cyber security monitoring and actions.

Read more...
Eighty percent of fraud fighters expect to deploy GenAI by 2025
Security Services & Risk Management
A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...