Dealing with farm attacks

Issue 2 2021 Editor's Choice, Integrated Solutions, Security Services & Risk Management, Agriculture (Industry)

The scourge of attacks and subsequent loss of life faced by the farming community across the country continues unabated with seemingly little desire on the part of authorities to stop these crimes. The government saw fit to disband the commando units that were protecting farms at one stage and appointed SAPS to carry out its protection role.

Unfortunately, this has never materialised and the government continues to deny there are organised attacks against farmers. The old commando units were more successful at protecting farmers by organising them and coordinating their protection, their advantage being that they were in the community and on the spot when required. SAPS does not have the manpower or the resources to provide the same support and relies entirely on a reactive effort.

Laurence Palmer is an independent security consultant with some 25 years of experience in the business. Before that, he held a senior command post in the SADF/SANDF where he worked closely with the farming community with the sole objective of keeping farms and farmers safe. He says the main emphasis in those days was prevention, not reacting after the crimes had been committed.

Proactively addressing the issue

When looking at the investigative findings based on 48 farm attacks in KwaZulu-Natal over the course of a year, it was found that the attackers were often trusted and participative members of the farm labour force. Also indicated is that the attacks are not political or race based and appear to be driven more by greed and personal discontent.

A disturbingly large number of farm attacks are committed without the farmers or their families having the time or opportunity to call for help or backup. Palmer believes that in the current situation, the best solution for farmers is to help themselves as a community. The critical factor is to develop a solution that is proactive rather than reactive to stop crime before it occurs.

Starting off, he suggests that distinct districts be defined and an in-depth risk assessment of each area performed. As part of this, it is considered essential to register and capture the personal details of every person that is resident in or works in each selected region. This information should be captured onto a central database that is secure, has offsite backups and permits access by all invested persons.

It is important that all farmers in the region agree to and participate in the project. If some are excluded, the whole project is in jeopardy, states Palmer. It is just as important to communicate with other support services, such as the SA Police Service, Metro Police, civil authorities, established security companies, business, local chiefs and Indunas, union bosses, farm labour, the farmers and their families.

Each member of the project must have the necessary equipment to be able to communicate with each other through an integrated messaging system, as well as with the main database where personnel and other regional information can be obtained.

It’s worth repeating that the full buy-in and cooperation of the farmers in the region are paramount as they are the prime target of criminals and the resultant defence project. The response team will require the authority and support of the farmers if they are to be successful. Some additional requirements include, but are not limited to:

• A rapid mobile reaction unit that can respond to incidents.

• The use of drones to gather information and identify activity.

• All vehicles to be fitted with GPS units.

• Remote alarm and panic buttons that are carried by all vulnerable persons.

• Weapons training: how, when and if to use them.

• First aid trauma training and response.

• Training in the effective and safe handling of cash and wages on the farm or business premises.

This article was extracted from a paper written by Laurence Palmer focusing on how to initiate an effective, proactive defence strategy against farm attacks. For more information contact Laurence Palmer, +27 73 954 4450, [email protected]


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Integration and IoT made easy
Technews Publishing SMART Security Solutions Access Control & Identity Management
The security industry is built on silos, be it surveillance, access control, alarms and others, but integration has become a critical issue in recent years. SMART Security Solutions speaks to Integr8 Systems about its local hardware and software.

Read more...
SMARTpod talks to Armata’s Richard Frost
Technews Publishing SMART Security Solutions Videos
SMARTpod, the podcast by SMART Security Solutions, recently spoke to Richard Frost from Armata about the company's new 'all-in-one' cybersecurity bundle designed to relieve cyber stress in the SMB market.

Read more...