A constant armed struggle

SMART Mining Security Solutions 2024 Editor's Choice, Integrated Solutions, Mining (Industry), IoT & Automation

Security in the mining industry is no joke. From the good old days when security meant stopping workers from stealing goods, it has devolved into a running battle where ‘soft’ crimes like fraud and theft go hand in hand with violent and often murderous activities by well-organised and funded criminal syndicates (see the associated article with Nash Lutchman in this issue on how security on mines has changed over the years).

State authorities are hardly useful in this matter as, in most cases, they are unable or unwilling to assist mines, even when innocent lives are at stake. This means mines have to go it alone, and we have seen mines invest in armoured vehicles and well-trained and armed tactical response teams – and even these are often outnumbered and outgunned. The old ‘guard at the gate’ scenario is no longer a factor in mines that take their security seriously.

SMART Security Solutions asked a few people involved in servicing mines to join us in a virtual round table and give us their insights into mine security today. Our participants were:

• Ian Downie, Director, Xone Integrated Security.

• Nick Grange, Director, XtraVision.

• Richard Groenewald, MD, Xone Integrated Security.

• Nash Lutchman is a retired risk executive with decades of experience at De Beers, Goldfields, and Sibanye.

• Kelly McLintock, Chair, Blacklight Group.

• Dave Rampersad, National Sales Manager, Syntell Group.

• Theuns van Schalkwyk, Director, XtraVision.

As seems to happen more often than ever before, the round table went off on a tangent from what we expected – as can be seen in this brief review. To accommodate any additional input from the participants, we spoke to them separately to learn more about their companies’ services and solutions for mines and the resulting insights are included in or following this article.

Starting out, we asked the participants for their views on the most important security challenges facing mines in South Africa and Africa at the moment. Sadly, these challenges seem to be growing and expanding to other countries, but we will not focus on that in this article.

Threats on every side

Starting out, Dave Rampersad highlighted the evolving security threats in the mining sector, including almost every security challenge mines face, from cybersecurity to illegal mining, community unrest and geopolitical risks.

Theuns van Schalkwyk highlighted the threats from illegal mining, but noted that it is not only about the theft of products, but also the health risks that come with mining activities. Mines go to great lengths to try to make a dangerous activity as safe as possible; illegal miners are under no obligation to do the same and ignore safety in favour of profit. One of the vulnerable areas in all mines is the perimeter (which is long) and wide-open spaces (which are very difficult to secure). Even with thousands of surveillance cameras, it is simply not possible to cover everything.

Adding to the list of security challenges mines have to deal with, a list that can take hours to work through, Ian Downie says the power situation (or lack of power) is a key factor in the efficient security of mines. He adds that legislation around mines is also complex and can cause problems, unnecessarily so. Moreover, given the extreme poverty in South Africa and the location of many mines, this is another security risk that does not seem solvable. Mines, therefore, need careful planning to handle the situation effectively.

Nick Grange highlights shrinkage as a significant problem, whether due to internal failure to follow the correct policies and procedures, or external factors such as illegal mining.

Nash Lutchman says executives underestimate the global security challenges we are facing today in terms of their impact on mines. Whether a mine is a global corporation or a small local mine, its product is sold internationally to various critical industries. The impact of global security uncertainty, the Red Sea shipping routes, for example (and many more), will impact business in the years to come.

Lutchman also advises that a mine should never allow an accountant or ‘non-security person’ to determine a security operation’s budget, structure, or tactics. These people have their own areas of expertise, but security is not one of them, and a price-based strategy will result in problems. The result will be similar to certain tender processes in government, where unskilled and inexperienced people were put in senior positions where they did not know what they are doing, with the results we see every day in South Africa. Similarly, companies with the wrong people in the wrong positions will not be a runaway success.

He knows that security cannot get the budget it wants, so mines have to rely on their security professionals to develop the most appropriate, resilient control environment for external and internal threats. He adds that it is critical that the control systems are resilient, flexible, and technology-enabled, in order to handle the realities of the threat environment.

While Lutchman is in favour of using technology to assist in risk management, he also warns that thinking technology will allow you to reduce the number of guards you need is wrong. At the same time, simply stocking up on hundreds or thousands of guards will not help either. Guarding personnel today need to be well trained, having gone through integrity and psychological screening to ensure they are the right fit for the job. They also need the right physical characteristics to meet the threats of attack they will face.

Taking care of your guards is just as important. They are not isolated window dressing, but must be part of the risk matrix and understand the operating tactics of the security team. Lives matter, and a mine has an obligation to keep its security personnel as safe as they can while on duty in a hostile environment.

The role of intelligence

Richard Groenewald comes from an engineering and technology background and approaches security challenges from an intelligence perspective. He says intelligence comes from data, and you need to build the appropriate environment that allows you to collect the data from many sources, analyse it and make the necessary decisions.

He agrees with Lutchman that, while you need ‘boots on the ground’ as a tactical response to threats, the real objective should be to avoid them, and avoidance comes from intelligence. He advises mines to spend time understanding what type of information they need and how to gather and analyse it effectively to reduce risk.

Kelly McLintock believes the industry is in flux at the moment and dynamic security strategies are required. He says all the issues raised above are relevant but need to be blended into a deliverable outcome that raises situational awareness and the ability to deal with security issues. The higher cost of production, dynamic exchange rates, and lower profits are a perfect storm that cuts budgets and affects the ability of security operations to deliver what is required.

The conversation took a number of twists and turns from then on, sometimes far beyond what we expected (which is good). Keep an eye out on SMART Security Solutions’ home page and our LinkedIn feed, as we will be releasing the whole conversation as a podcast shortly after the print publication is released.


The value of intelligence

Following the round table, SMART Security Solutions spoke to Ian Downie from Xone to learn more about the company’s approach to mines’ (and other customer’s) security. Xone has been in the security market for many years, offering a turnkey solution to mines and other sectors.

While Xone covers the security spectrum and can provide guarding as well as technical services to install and maintain its clients’ infrastructures or work with project managers and third-party contractors, its key differentiator is its focus on command and control.

Downie explains that the company starts by conducting a camera assessment of the client’s environment, which is no small task for a mine with thousands of cameras. The goal is to understand each camera’s task and how it functions day and night, determining if it is fit for purpose. The results are compared to the client’s risk plan to see how, or if each one achieves the output required, marrying the output to the risk profile. This allows it to develop and drive specific processes for various security aspects – fencing, cameras, gates, etc.

With this understanding, Xone creates the control room environment (onsite, remote, or a hybrid) to match the client’s goals. Some cameras may be monitored via a black screen approach, while those in high-risk areas may be monitored 24/7. Under the overarching goals of the business risk plan, the processes for each operator are also defined, as are the priorities for different events.

Based on the information collected, Xone employs specialised business analysts at its head office who turn the data into a detailed business process that runs on an incident management platform (IMS). The analysts continuously update the IMS, and the information is used by trainers to teach the control room managers, supervisors, and operators how to apply those processes to deliver each according to each customer’s required outcomes. The control room operators and supervisors are involved in a constant improvement process; provided with regular training.

Xone also has specialised software that monitors the operators while on the job, measuring what they do well, how it compares to their peers and previous performance, and whether they are achieving the required output. The company has several key performance indicators through which its quality control team can tell how well each operator is doing.

This is a timely approach, as Downie says errors are caught in real time. This allows supervisors to assist operators almost immediately while the event is happening to ensure they are ready for the next event of the same nature. It’s learning on the job rather than getting a lecture a few days or weeks later.

While many control rooms use an IMS, which is populated with loads of data that does not accomplish much, the information in Xone’s IMS is used to create detailed reports to various interest groups on the mines. For example, a report goes to the board of directors, providing them with accurate, current, and pertinent information. This allows them to understand the business’s risk and how well its teams meet its goals and achieve the drive to constant improvement.


For more information, contact:

• Blacklight Group, [email protected], www.blacklightgroup.co.za

• Syntell, +27 11 582 2500, [email protected], www.syntell.co.za

• Xone Integrated Security, 0861 656 565, [email protected], www.xone.co.za

• XtraVision, +27 11 450 1056, [email protected], www.xtravision.co.za


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
250 000 connected vehicles in Africa
Asset Management Transport (Industry) Logistics (Industry) IoT & Automation
Wialon, the global fleet digitalisation platform created by software developer Gurtam, announced it has reached a record number of 250 000 fleet vehicles and assets connected in Africa.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
From the editor's desk: Regulations, standards and skills, but poor enforcement
Technews Publishing SMART Security Solutions Fire & Safety
South Africa depends on the carrot approach to fire safety; in other words, businesses choosing to do the right thing, as the stick (or enforcement of regulations) is unfortunately lacking.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Wildfires: a growing global threat
Editor's Choice Fire & Safety
Regulatory challenges and litigation related to wildfire liabilities are on the rise, necessitating robust risk management strategies and well-documented wildfire management plans. Technological innovations are enhancing detection and suppression capabilities.

Read more...
IoT innovation in water mist fire protection
Fire & Safety Products & Solutions IoT & Automation
Marioff, a provider of water mist fire protection, has introduced an Internet of Things (IoT) solution designed for high-pressure water mist systems, enabling real-time monitoring, smart alerts, and centralised control.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.