Log In

Police arrest one suspect in Kasoa-Winneba road robbery

Published 10 hours ago2 minute read

The Central East Regional Police Command has arrested one suspect in connection with a robbery incident that occurred in the early hours of Sunday, 6th July 2025, at Dabanyin near Gomoa Buduatta Junction along the Kasoa-Winneba Road.

Preliminary investigations indicate that at about 12:30 a.m., the arrested suspect, Mohammed Bello, and four accomplices, who are currently at large, robbed drivers and passengers of their personal belongings.

Some items stolen included mobile phones and an unspecified amount of money.

Through swift and vigilant police action, suspect Mohammed Bello was arrested in the vicinity while trying to escape. A search conducted on him led to the retrieval of cash the sum of GH₵3,740.00, two Samsung smartphones, one Tecno Spark 20, an Itel keypad phone, an Itel power bank, a lady’s purse, five sticks of cigarettes, a wristwatch, a headset, and a mobile phone charger head as well as a pair of sandals which has been identified by one of the victims.

The suspect is currently in Police custody and assisting with the ongoing investigation while intelligence-led operations are underway to arrest the remaining members of the gang and bring them to justice.

Meanwhile, four of the robbery victims who sustained gunshot wounds during the attack are receiving medical treatment at the hospital.

They expressed their gratitude to the Regional police command upon hearing of the arrest made, and also the frantic efforts being made to arrest the remaining suspects connected to the robbery.

The Central East Regional Police Command further urged members of the public who may have fallen victim to the robbery incident to visit the Regional Police Command to assist with the investigation.

The Command also assured the general public that all accomplices to this crime will be arrested to face the full rigours of the law.

Origin:
publisher logo
CitiNewsroom.com
Loading...
Loading...
Loading...

You may also like...