Drones: One aspect of an integrated security strategy

CCTV Handbook 2021 Surveillance, Integrated Solutions, Security Services & Risk Management

Drones have recently become hot news once again, with some talking up their use in the security industry. It is critical for customers to realise that drones are an excellent tool in the safety and security arsenal in the never-ending fight against crime, but they are only a tool, one of many needed for an effective security solution.

Waal De Waal, chief operating officer at Bidvest Protea Coin (BPC), explains that the company has been using drones in its tactical operations since 2013. “This puts us at the forefront of the implementation of drone technology in crime prevention as we have been leading the development of this aerial technology over the years.

“The strategic acquisition by Bidvest of UDS (UAV & Drone Solutions) two years ago ensures that we remain one of the industry leaders when it comes to smart aerial surveillance.”

De Waal states that the key to drone usage is the word ‘tactical’. The drone element of a security service needs to be part of the full solution, which in the case of BPC includes security officers and armed response on the ground, positioned to respond quickly and effectively to any alerts the drones provide and even be backed up by helicopters and other response teams when required.

Since drones can cover a large distance in their patrols, this makes them ideal for perimeter security and for covering large areas of open ground. However, here again, if the ground forces are not strategically placed to respond to any incidents, the drone has limited scope.

De Waal says that each customer has a different risk acceptance model. “Some customers want detection, detention and arrests, while others may simply prefer detection and deflection of the perpetrators from their sites.”

As an example, one BPC client wanted drone coverage over a large area, but did not want to invest in the recommended ground staff (tactical response vehicles etc.) which resulted in the following statistics:

• BPC performed 11 500 hours of drone flights at 12 sites over 12 months.

• 589 suspects were identified during the operations.

• 113 arrests were made.

“What this means is that 81% of suspects were never apprehended due to the lack of a tactical approach to the operation,” says De Waal.

“Our approach to delivering effective tactical operation solutions to our clients is guided by a site-specific security and safety plan that is designed for each customer’s requirements. The design and implementation of an effective operation includes the deployment of our drones and helicopter, tactical ground response units and centralised control of the operation.”

Over the period between January and May 2021, BPC operations using drones have produced excellent results. Some of the successes include:

• The recovery of 1.9 tons of copper cable.

• Recovery of 9000 litres of diesel.

• 89 arrests.

• 73 illegal miners detected and deflected from entering a mine in one operation.

• 300 suspects deflected in various tactical operations.

Customised, integrated solutions

BPC’s operations are designed around its customers’ security philosophy and take into account the intelligence gathered, risk, location, terrain and size of the site. “Our core focus is providing tactical aerial surveillance to, among others, the mining sector, petrochemical sector, large industrial facilities, linear infrastructure such as rail, power and large resorts. Our value-added solutions include engineering, high wall and contractor compliance inspections. Stockpile management and blast clearance inspections are also highly sought-after services.”

One recent case on an open pit mine saw a drone spotting civilians on the site minutes before blasting took place. By alerting the management, blasting was cancelled until the people were evacuated.

Of course, drones are also deployed to look after the safety of BPC’s own personnel by detailing the threat it detects and for example, whether weapons are present and the numbers of suspects/assailants. In many cases, the drones are used with their lights on to provide warning of their presence and to deter or deflect the planned attack or intrusion. This is also important in light of the pandemic as it can deflect criminal activities without requiring security officers to come into contact with people and vice versa.

Providing the customer, the BPC control room as well as staff on the ground with extended situational awareness not only keeps people safe and ensures responses are in line with the risks, but also allows for a continual monitoring of the security strategy to ensure BPC continually delivers the best service.

Ensure a properly thought out deployment

De Waal adds that not all drones are equal, nor can they be used at any time. For example, some drones have a flight time of 20 to 40 minutes before their battery runs out so their patrols are quite short before they need to return for a battery change. Other drones can fly for three or four hours, but this flight time depends on what the drone is carrying – for example, a visual camera and/or a thermal camera, lights etc.

The use of drones is also subject to strict legal controls as well as environmental conditions: drones cannot be launched when it is raining or in strong wind. The legal requirements further stipulate each flight must be logged in advance and the drones must be piloted by qualified pilots.

“This again demonstrates that drones should be part of a strategic security plan to ensure the right devices are used for each customer’s requirements,” says De Waal. “This means the strategic planning and customised SOPs (standard operating procedures) for each client are critical and must be designed with care to meet the customer’s requirements.”

Additionally, De Waal comments on the myth of criminals shooting down drones. BPC drones fly at a height of about 150 m and are always moving, even when hovering, which means that hitting a drone is extremely difficult.

An integrated, strategic solution

The use of drones in the safety and security market is a given, states De Waal. However, it is important for customers to note that a drone is like a surveillance camera or a secure access control point. It is a tool that must be used strategically to enhance the tactical capabilities of the service provider to achieve the results customers want.

“Simply having a drone in the air is of little value unless the devices are integrated into the rest of your services to ensure any information received can be acted upon and the relevant response initiated.”


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Smarter investigations in Security Center SaaS
Genetec Surveillance
Genetec has announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.