Dealing with farm attacks

Issue 2 2021 Editor's Choice, Integrated Solutions, Security Services & Risk Management, Agriculture (Industry)

The scourge of attacks and subsequent loss of life faced by the farming community across the country continues unabated with seemingly little desire on the part of authorities to stop these crimes. The government saw fit to disband the commando units that were protecting farms at one stage and appointed SAPS to carry out its protection role.

Unfortunately, this has never materialised and the government continues to deny there are organised attacks against farmers. The old commando units were more successful at protecting farmers by organising them and coordinating their protection, their advantage being that they were in the community and on the spot when required. SAPS does not have the manpower or the resources to provide the same support and relies entirely on a reactive effort.

Laurence Palmer is an independent security consultant with some 25 years of experience in the business. Before that, he held a senior command post in the SADF/SANDF where he worked closely with the farming community with the sole objective of keeping farms and farmers safe. He says the main emphasis in those days was prevention, not reacting after the crimes had been committed.

Proactively addressing the issue

When looking at the investigative findings based on 48 farm attacks in KwaZulu-Natal over the course of a year, it was found that the attackers were often trusted and participative members of the farm labour force. Also indicated is that the attacks are not political or race based and appear to be driven more by greed and personal discontent.

A disturbingly large number of farm attacks are committed without the farmers or their families having the time or opportunity to call for help or backup. Palmer believes that in the current situation, the best solution for farmers is to help themselves as a community. The critical factor is to develop a solution that is proactive rather than reactive to stop crime before it occurs.

Starting off, he suggests that distinct districts be defined and an in-depth risk assessment of each area performed. As part of this, it is considered essential to register and capture the personal details of every person that is resident in or works in each selected region. This information should be captured onto a central database that is secure, has offsite backups and permits access by all invested persons.

It is important that all farmers in the region agree to and participate in the project. If some are excluded, the whole project is in jeopardy, states Palmer. It is just as important to communicate with other support services, such as the SA Police Service, Metro Police, civil authorities, established security companies, business, local chiefs and Indunas, union bosses, farm labour, the farmers and their families.

Each member of the project must have the necessary equipment to be able to communicate with each other through an integrated messaging system, as well as with the main database where personnel and other regional information can be obtained.

It’s worth repeating that the full buy-in and cooperation of the farmers in the region are paramount as they are the prime target of criminals and the resultant defence project. The response team will require the authority and support of the farmers if they are to be successful. Some additional requirements include, but are not limited to:

• A rapid mobile reaction unit that can respond to incidents.

• The use of drones to gather information and identify activity.

• All vehicles to be fitted with GPS units.

• Remote alarm and panic buttons that are carried by all vulnerable persons.

• Weapons training: how, when and if to use them.

• First aid trauma training and response.

• Training in the effective and safe handling of cash and wages on the farm or business premises.

This article was extracted from a paper written by Laurence Palmer focusing on how to initiate an effective, proactive defence strategy against farm attacks. For more information contact Laurence Palmer, +27 73 954 4450, unicornnlpconsulting@gmail.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.